A system (100), method and media for an entity centric computer that develops, entity knowledge before analyzing, applying, distributing, maintaining, replicating and/or synchronizing said knowledge as required and/or requested.

Patent
   7401057
Priority
Dec 10 2002
Filed
Nov 19 2003
Issued
Jul 15 2008
Expiry
May 07 2025
Extension
535 days
Assg.orig
Entity
Large
178
204
all paid
43. A computer implemented entity knowledge method, comprising
Preparing a plurality of entity related data for use in processing,
Analyzing at least a portion of said data as required to develop an entity knowledge, and
Using said knowledge to complete useful activities selected from the group consisting of identifying the data, information and knowledge that is most relevant to the entity, identifying entity preferences, loading the data and information that is most relevant to the entity into a cache, optimize information technology support of entity performance, providing a true natural language interface for entity related software and combinations thereof where an entity knowledge further comprises a model of entity behavior that supports the identification of an optimal set of actions for a given context.
27. A computer implemented context search method, comprising
Aggregating data related to an entity in accordance with a common schema,
Analyzing at least a portion of said data as required to identify an entity context and one or more priorities for said entity given said context,
Identifying data, information and knowledge that is relevant to said entity context, and
Presenting at least one of relevant data, relevant information or relevant knowledge after sorting said data, information or knowledge on the basis of entity context relevancy and priorities
where an entity context identifies one or more aspects of a context that have a tangible impact on a behavior of an entity, and
where data related to an entity are obtained from a world wide web and the group consisting of a plurality of entity related narrow system databases, one or more external databases, an Intranet, a direct input and combinations thereof.
19. A computer implemented search method comprising:
aggregating data from a plurality of entity related systems,
develop one or more entity contexts for an individual entity and for a group of individual entities using at least a portion of said data,
identifying a combination of data and information that is relevant to one or more layers of context for an entity selected from the group consisting of the individual entity, the group entity and combinations thereof using said entity contexts, and
displaying the results in order of relevance
where an entity context further comprises a relationship context layer and a plurality of context layers selected from the group consisting an element context layer, a resource context layer, a factor context layer, a reference context layer, a measure context layer, a transaction context layer, a lexical context layer and combinations thereof, and
where an entity context identifies one or more aspects of a context that have a tangible effect on a behavior of an entity.
24. A program storage device readable by a computer, tangibly embodying a program of instructions executable by at least one computer to perform the steps in a context distribution method, comprising:
aggregate data from a plurality of entity related systems,
develop one or more entity contexts using at least a portion of said data where an entity context includes a reference context and one or more different aspects of context selected from the group consisting element context, resource context, factor context, measure context, relationship context, transaction context, lexical context and combinations thereof, and
distribute one or more of the entity contexts in an automated fashion
where an entity context identifies one or more aspects of a context that have a tangible influence on a behavior of an entity,
where an entity context further comprises a quantified impact of one or more other types of entities on one or more aspects of said entity context, and
where the computer readable medium further comprises a plurality of intelligent agents.
1. An entity context apparatus, comprising:
a plurality of entity related systems and databases,
means for preparing data from said systems and databases for use in processing,
means for developing a complete entity context using at least a portion of said data,
means for data and information storage, and
means for complete entity context distribution
where a complete entity context identifies each of the one or more aspects of a context that have a tangible effect on a behavior of an entity,
where an entity that comprises a multi entity organization or an entity from the organization domain has two or more entity function measures and any combination of one or more financial measures for all or part of said subiect entity comprise a single function measure, and
where a complete entity context includes different aspects of context selected from the group consisting element context, resource context, factor context, reference context, measure context, relationship context, transaction context, lexical context, temporal context and combinations thereof.
33. A program storage device readable by a computer, tangibly embodying a program of instructions executable by at least one computer to perform the steps in a context search method, comprising:
Aggregating data related to an entity in accordance with a common schema,
Analyzing at least a portion of said data as required to identify an entity context and one or more priorities for said entity given said context,
Identifying data, information and knowledge that is relevant to said entity context, and
Presenting at least one of relevant data, relevant information or relevant knowledge after sorting said data, information or knowledge on the basis of entity context relevancy and priorities
where an entity context identifies one or more aspects of a context that have a tangible effect on a behavior of an entity,
where identifying an entity context further comprises quantifying an impact of one or more other types of entities on each of one or more aspects of said context; and
where an entity context further comprises a measure context and one or more aspects of context selected from the group consisting of resource context, factor context, element context, reference context, relationship context, transaction context, lexical context, temporal context and combinations thereof.
39. A context search system comprising:
networked computers each with a processor having circuitry to execute instructions; a storage device available to each processor with sequences of instructions stored therein, which when executed cause the processors to:
(a) aggregate data related to an entity in format suitable for processing,
(b) analyze at least a portion of said data as required to identify an entity context and one or more priorities for said entity given said context,
(c) identify data, information and knowledge that is relevant to said entity context, and
(d) presenting at least one of relevant data, relevant information or relevant knowledge after it is sorted on the basis of entity context relevancy and priorities
where an entity context identifies each of the one or more aspects of a context that have a tangible impact on a behavior of an entity,
where one or more priorities for the entity are identified by said entity, and
where an entity context further comprises a factor context and one or more aspects of context selected from the group consisting of measure context, resource context, reference context, element context, relationship context, transaction context, lexical context, temporal context and combinations thereof where a measure context further identifies and quantifies an impact of actions, events, elements, factors and resources on each of a plurality of entity function measures by time period.
10. A program storage device readable by a computer, tangibly embodying a program of instructions executable by at least one computer to perform the steps in an entity context method, comprising:
aggregating data from a plurality of entity related systems,
developing a complete entity context using at least a portion of said data where a complete entity context includes one or more different aspects of context selected from the group consisting element context, resource context, factor context, reference context, measure context, relationship context, transaction context, lexical context and combinations thereof and where a complete entity context identifies each of the one or more aspects of a context that have a tangible influence on a behavior of an entity, where an enterprise entity has two or more entity function measures, and
using a complete entity context to support useful activities selected from the group consisting of completing one or more entity related actions in an optimal manner, identifying a valid context space for entity analyses, underwriting one or more entity related securities, displaying a plurality of performance information for one or more entity function measures, forecasting an entity behavior, forecasting an entity sustainability and combinations thereof
where an entity that comprises a multi entity organization or an entity from the organization domain has two or more function measures and any combination of one or more financial measures for all or part of said subject entity comprise a single function measure, and
where developing a complete entity context further comprises quantifying an impact of one or more other types of entities on each of one or more aspects of said complete context.
2. The apparatus of claim 1 that further comprises means for applying all or part of a complete entity context to support useful activities selected from the group consisting of completing one or more entity related actions in an optimal manner, identifying a valid context space for entity analyses, underwriting one or more entity related securities, displaying a plurality of entity related information, forecasting an entity behavior, forecasting an entity sustainability and combinations thereof.
3. The apparatus of claim 1 where an entity is selected from a group of domains consisting of political, habitat, intangibles, interpersonal, market, organization, biology, cellular, organism, protein, chemistry, geology, physics, space, tangible goods, water, weather and combinations thereof.
4. The apparatus of claim 1 where an entity is a separate entity, a combination of two or more entities or a multi-entity system.
5. The apparatus of claim 1 where an entity is a member of one or more groups selected from the group consisting of voter, precinct, caucus, city, county, state/province, regional, national, multi-national, global, household, neighborhood, community, city, region, brand, expectations, ideas, ideology, knowledge, law, money, right, relationship, service, individual, nuclear family, extended family, clan, ethnic group, organization, multi-organization, industry, market, economy, team, group, department, division, company, organization species, genus, family, order, class, phylum, kingdom, macromolecular complexes, protein, ma, dna, x-ylation, organelles, cells, structures, organs, organic systems, organism, monomer, dimer, large oligomer, aggregate, particle, molecules, compounds, chemicals, catalysts, minerals, sediment, rock, landform, plate, continent, planet, quark, particle zoo, protons, neutrons, electrons, atoms, molecules, dark matter, asteroids, comets, planets, stars, solar system, galaxy, universe, compounds, minerals, components, subassemblies, assemblies, subsystems, goods, systems pond, lake, bay, sea, ocean, creek, stream, river, current, atmosphere, clouds, lightning, precipitation, storm, wind and combinations thereof.
6. The apparatus of claim 1 where preparing data for use in processing further comprises:
developing a common entity specific configuration for organizing data selected from the group consisting of schema, ontology and combinations thereof, and
converting data to a common entity specific schema and storing said data in accordance with said schema, converting data to a common entity specific ontology and storing said data in accordance with said ontology or a combination thereof.
7. The apparatus of claim 1 where data are aggregated from the group of consisting of organization systems, personal systems, bio medical systems, scientific systems, devices and combinations thereof.
8. The apparatus of claim 1 that is supported by computer hardware from the group consisting of a computer, a cluster, a plurality of computers connected via a network, one or more virtual computers, one or more blade servers, a plurality of computers connected via a grid, a device and combinations thereof.
9. The apparatus of claim 1 that further comprises support for context development, context storage and context distribution for a collection of entities or a population of entities.
11. The program storage device of claim 10 where each of one or more aspects of context are developed in an automated fashion by learning from the data.
12. The program storage device of claim 10, wherein each of one or entity function measures further comprise a measure selected from the group consisting of a temporal measure, a transaction measure, a financial measure, a physical measure, a satisfaction measure and combinations thereof.
13. The program storage device of claim 10 where an entity is a separate entity, a collaboration between two or more entities or a multi-entity system.
14. The program storage device of claim 10 where an entity is a member of one or more groups selected from the group consisting of voter, precinct, caucus, city, county, state/province, regional, national, multi-national, global, household, neighborhood, community, city, region, brand, expectations, ideas, ideology, knowledge, law, money, right, relationship, service, individual, nuclear family, extended family, clan, ethnic group, organization, multi-organization, industry, market, economy, team, group, department, division, company, organization species, genus, family, order, class, phylum, kingdom, macromolecular complexes, protein, ma, dna, x-ylation, organelles, cells, structures, organs, organic systems, organism, monomer, dimer, large oligomer, aggregate, particle, molecules, compounds, chemicals, catalysts, minerals, sediment, rock, landform, plate, continent, planet, quark, particle zoo, protons, neutrons, electrons, atoms, molecules, dark matter, asteroids, comets, planets, stars, solar system, galaxy, universe, compounds, minerals, components, subassemblies, assemblies, subsystems, goods, systems pond, lake, bay, sea, ocean, creek, stream, river, current, atmosphere, clouds, lightning, precipitation, storm, wind and combinations thereof.
15. The program storage device of claim 10 where a complete entity context is developed by a series of models selected from the group consisting of; regression, generalized additive; support vector method, entropy minimization, generalized autoregressive conditional heteroskedasticity, wavelets, Markov, Viterbi, relevance vector method, Ornstein—Uhlenbeck, Bayesian, kriging, multivalent, multivariate adaptive regression splines, swarm, probabilistic—relational, power law, fractal, data envelopment analysis, path analysis and combinations thereof.
16. The program storage device of claim 10 where a complete entity context includes attributes from the group consisting of the definition of one or more entity functions, the relative importance of the one or more entity functions, one or more entity function measures, the identity and description of current, past and future entity actions, the identity and description of elements that support the completion of entity actions, the identity and description of resources consumed during the completion of entity actions, the identity and description of environmental factors that affect the completion of entity actions, the interrelationship between elements, factors and resources, the relationship between elements, factors, resources, entity actions and entity function measure performance and combinations thereof.
17. The program storage device of claim 10 where a complete entity context is developed in an automated fashion by learning from the data.
18. The program storage device of claim 10 where the method further comprises identifying a valid context space for each entity context.
20. The method of claim 19 that further comprises:
completing a transaction in an automated fashion where a price for said transaction is a function of an entity context.
21. The method of claim 19 wherein a measure context layer provides information that supports an identification of data and information relevance that is a function of its value to an entity.
22. The method of claim 19 wherein each entity context layer of a plurality of context layers is developed in automated fashion by learning from the data.
23. The method of claim 19 that has a context quotient of 200.
25. The program storage device of claim 24 that supports distribution methods selected from the group consisting of device synchronization, device synchronization and replication, packet distribution, natural language interface and combinations thereof.
26. The program storage device of claim 24 that distributes one or more aspects of context in one or more separate layers where said layers further comprise operating system layers, middleware layers or web service capabilities.
28. The method of claim 27, wherein an entity context further comprises an element context and one or more aspects of context selected from the group consisting of resource context, factor context, reference context, measure context, relationship context, transaction context, lexical context, temporal context and combinations thereof
where a reference context further comprises information that defines a relationship of one or more aspects of context selected from the group consisting element context, resource context, factor context, measure context, relationship context, transaction context and combinations thereof to one or more coordinate systems over time.
29. The method of claim 27, wherein one or more priorities are defined by one or more mission measures.
30. The method of claim 29, wherein one or more mission measures further comprise any quantifiable measure.
31. The method of claim 29, wherein one or more mission measures further comprise measures selected from the group consisting of a temporal measure, a transaction measure, a financial measure, a physical measure, a satisfaction measure and combinations thereof.
32. The method of claim 27, wherein an entity context is developed by learning from the data.
34. The program storage device of claim 33, wherein one or more priorities are defined by one or more mission measures.
35. The program storage device of claim 34, wherein one or more mission measures further comprise any quantifiable measure selected from the group consisting of a transaction measure, a financial measure, a physical measure, a satisfaction measure and combinations thereof.
36. The program storage device of claim 33, wherein data related to an entity are obtained from the group consisting of a plurality of entity related narrow system databases, one or more external databases, a world wide web, a direct input and combinations thereof.
37. The program storage device of claim 33, wherein one or more priorities for an entity are identified in an automated manner by learning from the data.
38. The program storage device of claim 33, wherein an entity is selected from a group of domains consisting of political, habitat, intangibles, interpersonal, market, organization, biology, cellular, organism, protein, chemistry, geology, physics, space, tangible goods, water, weather and combinations thereof.
40. The system of claim 39, wherein one or more priorities are defined by one or more entity function measures where said function measures further comprise a temporal measure and one or more measures selected from the group consisting of a transaction measure, a financial measure, a physical measure, a satisfaction measure and combinations thereof.
41. The system of claim 39, wherein identifying data, information or knowledge that is relevant to an entity context further comprises the development of one or more indices for a measure context and for aspects of context selected from the group consisting of element context, factor context, reference context, relationship context, transaction context, lexical context, temporal context, resource context and combinations thereof.
42. The program storage device of claim 33, wherein data related to an entity are obtained from the group consisting of a one or more entity related narrow system databases, one or more external databases, a world wide web, a direct input and combinations thereof.

This application claims priority from provisional application No. 60/432,283 filed on Dec. 10, 2002 and provisional application No. 60/464,837 filed on Apr. 23, 2003 the disclosures of which are incorporated herein by reference. The subject matter of this application is related to the subject matter of U.S. patent application Ser. No. 11/262,146 filed Oct. 28, 2005, U.S. patent application Ser. No. 11/268,021 filed Nov. 7, 2005, U.S. patent application Ser. No. 11/094,171 filed Mar. 31, 2005, U.S. patent application Ser. No. 11/279,104 filed Mar. 8, 2006, U.S. patent application Ser. No. 11/358,196 filed Feb. 21, 2006 and U.S. Pat. No. 7,039,654 issued May 2, 2006 the disclosures of which are incorporated herein by reference.

This invention relates to methods, systems and media for an entity centric computer system that develops entity knowledge before analyzing, maintaining, distributing, integrating, synchronizing and applying said knowledge as required and/or requested.

It is a general object of the present invention to provide a novel, useful system that develops and maintains knowledge in a systematic fashion for entities in one or more domains and supports the distribution, synchronization, integration, analysis and application of this knowledge using a Complete Context™ Suite of applications (625), a Complete Context™ Development System (610), a Complete Context™ Bot (650), a narrow system (4) and/or a device (3) as required and/or as requested.

The innovative system of the present invention supports the development and integration of any combination of data, information and knowledge from systems that analyze, monitor and/or support entities in three distinct areas, a social environment area (1000), a natural environment area (2000) and a physical environment area (3000). Each of these three areas can be further subdivided into domains. Each domain can in turn be divided into a hierarchy or group. Each member of a hierarchy or group is a type of entity.

The social environment area (1000) includes a political domain hierarchy (1100), a habitat domain hierarchy (1200), an intangibles domain group (1300), an interpersonal domain hierarchy (1400), a market domain hierarchy (1500) and an organization domain hierarchy (1600). The political domain hierarchy (1100) includes a voter entity type (1101), a precinct entity type (1102), a caucus entity type (1103), a city entity type (1104), a county entity type (1105), a state/province entity type (1106), a regional entity type (1107), a national entity type (1108), a multi-national entity type (1109) and a global entity type (1110). The habitat domain hierarchy includes a household entity type (1202), a neighborhood entity type (1203), a community entity type (1204), a city entity type (1205) and a region entity type (1206). The intangibles domain group (1300) includes a brand entity type (1301), an expectations entity type (1302), an ideas entity type (1303), an ideology entity type (1304), a knowledge entity type (1305), a law entity type (1306), a money entity type (1307), a right entity type (1308), a relationship entity type (1309) and a service entity type (1310). The interpersonal domain hierarchy includes (1400) includes an individual entity type (1401), a nuclear family entity type (1402), an extended family entity type (1403), a clan entity type (1404) and an ethnic group entity type (1405). The market domain hierarchy (1500) includes a multi entity type organization entity type (1502), an industry entity type (1503), a market entity type (1504) and an economy entity type (1505). The organization hierarchy (1600) includes team entity type (1602), a group entity type (1603), a department entity type (1604), a division entity type (1605), a company entity type (1606) and an organization entity type (1607). These relationships are summarized in Table 1.

TABLE 1
Social
Environment
Domains Members (lowest level to highest for hierarchies)
Political voter (1101), precinct (1102), caucus (1103), city
(1100) (1104), county (1105), state/province (1106),
regional (1107), national (1108), multi-national
(1109), global (1110)
Habitat household (1202), neighborhood (1203), community
(1200) (1204), city (1205), region (1206)
Intangibles brand (1301), expectations (1302), ideas (1303),
Group (1300) ideology (1304), knowledge (1305), law (1306),
intangible assets (1307), right (1308),
relationship (1309), service (1310)
Interpersonal individual (1401), nuclear family (1402), extended
(1400) family (1403), clan (1404), ethnic group (1405)
Market (1500) multi entity organization (1502),
industry (1503), market (1504), economy (1505)
Organization team (1602), group (1603), department (1604),
(1600) division (1605), company (1606), organization (1607)

The natural environment area (2000) includes a biology domain hierarchy (2100), a cellular domain hierarchy (2200), an organism domain hierarchy (2300) and a protein domain hierarchy (2400) as shown in Table 2. The biology domain hierarchy (2100) contains a species entity type (2101), a genus entity type (2102), a family entity type (2103), an order entity type (2104), a class entity type (2105), a phylum entity type (2106) and a kingdom entity type (2107). The cellular domain hierarchy (2200) includes a macromolecular complexes entity type (2202), a protein entity type (2203), a rna entity type (2204), a dna entity type (2205), an x-ylation** entity type (2206), an organelles entity type (2207) and cells entity type (2208). The organism domain hierarchy (2300) contains a structures entity type (2301), an organs entity type (2302), a systems entity type (2303) and an organism entity type (2304). The protein domain hierarchy contains a monomer entity type (2400), a dimer entity type (2401), a large oligomer entity type (2402), an aggregate entity type (2403) and a particle entity type (2404). These relationships are summarized in Table 2.

TABLE 2
Natural
Environment
Domains Members (lowest level to highest for hierarchies)
Biology (2100) species (2101), genus (2102), family (2103, order
(2104), class (2105), phylum (2106), kingdom (2107)
Cellular* (2200) macromolecular complexes (2102), protein (2103), rna
(2104), dna (2105), x-ylation** (2106), organelles
(2107), cells (2108)
Organism (2300) structures (2301), organs (2302), systems (2303),
organism (2304)
Proteins (2400) monomer (2400), dimer (2401), large oligomer (2402),
aggregate (2403), particle (2404)
*includes viruses
**x = methyl, phosphor, etc.

The physical environment area (3000) contains a chemistry group (3100), a geology domain hierarchy (3200), a physics domain hierarchy (3300), a space domain hierarchy (3400), a tangible goods domain hierarchy (3500), a water group (3600) and a weather group (3700) as shown in Table 3. The chemistry group (3100) contains a molecules entity type (3101), a compounds entity type (3102), a chemicals entity type (3103) and a catalysts entity type (3104). The geology domain hierarch contains a minerals entity type (3202), a sediment entity type (3203), a rock entity type (3204), a landform entity type (3205), a plate entity type (3206), a continent entity type (3207) and a planet entity type (3208). The physics domain hierarchy (3300) contains a quark entity type (3301), a particle zoo entity type (3302), a protons entity type (3303), a neutrons entity type (3304), an electrons entity type (3305), an atoms entity type (3306), and a molecules entity type (3307). The space domain hierarchy contains a dark matter entity type (3402), an asteroids entity type (3403), a comets entity type (3404), a planets entity type (3405), a stars entity type (3406), a solar system entity type (3407), a galaxy entity type (3408) and universe entity type (3409). The tangible goods hierarchy contains a compounds entity type (3502), a minerals entity type (3503), a components entity type (3504), a subassemblies entity type (3505), an assemblies entity type (3506), a subsystems entity type (3507), a goods entity type (3508) and a systems entity type (3509). The water group (3600) contains a pond entity type (3602), a lake entity type (3603), a bay entity type (3604), a sea entity type (3605), an ocean entity type (3606), a creek entity type (3607), a stream entity type (3608), a river entity type (3609) and a current entity type (3610). The weather group (3700) contains an atmosphere entity type (3701), a clouds entity type (3702), a lightning entity type (3703), a precipitation entity type (3704), a storm entity type (3705) and a wind entity type (3706).

TABLE 3
Physical
Environment
Domains Members (lowest level to highest for hierarchies)
Chemistry Group molecules (3101), compounds (3102), chemicals
(3100) (3103), catalysts (3103)
Geology minerals (3202), sediment (3203), rock (3204),
(3200) landform (3205), plate (3206),
continent (3207), planet (3208)
Physics quark (3301), particle zoo (3302), protons (3303),
(3300) neutrons (3304), electrons (3305), atoms (3306),
molecules (3307)
Space dark matter (3402), asteroids (3403), comets (3404),
(3400) planets (3405), stars (3406), solar system (3407),
galaxy (3408), universe (3409)
Tangible Goods money (3501), compounds (3502), minerals (3503),
(3500) components (3504), subassemblies (3505),
assemblies (3506), subsystems (3507), goods
(3508), systems (3509)
Water Group pond (3602), lake (3603), bay (3604), sea (3605),
(3600) ocean (3606), creek (3607), stream (3608), river
(3609), current (3610)
Weather Group atmosphere (3701), clouds (3702), lightning (3703),
(3700) precipitation (3704), storm (3705), wind (3706)

Individual entities are items of one or more entity type, elements associated with one or more entity type, resources associated with one or more entity type and combinations thereof. Because of this, analyses of entities can be linked together to support an analysis that extends vertically across several domains. Entities can also be linked together horizontally to follow a chain of events that impacts an entity. These vertical and horizontal chains are partially recursive. The domain hierarchies and groups shown in Tables 1, 2 and 3 can be organized into different areas and they can also be expanded, modified, extended or pruned as required to support different analyses.

Data, information and knowledge from these seventeen different domains are integrated and analyzed as required to support the creation of subject entity knowledge. The knowledge developed by this system is comprehensive. However, it focuses on the function performance (note the terms behavior and function performance will be used interchangeably) of a single entity as shown in FIG. 2A, a collaboration or partnership between two or more entities in one or more domains as shown in FIG. 2B and/or a multi entity system in one or more domains as shown in FIG. 3. FIG. 2A shows an entity (900) and the conceptual inter-relationships between a location (901), a project (902), an event (903), a virtual location (904), a factor (905), a resource (906), an element (907), an action/transaction (909), a function measure (910), a process (911), an entity mission (912), constraint (913) and a preference (914). FIG. 2B shows a collaboration (925) between two entities and the conceptual inter-relationships between locations (901), projects (902), events (903), virtual locations (904), factors (905), resources (906), elements (907), action/transactions (909), a joint measure (915), processes (911), a joint entity mission (916), constraints (913) and preferences (914). For simplicity we will hereinafter use the terms entity or subject entity with the understanding that they refer to an entity (900) as shown in FIG. 2A, a collaboration between two or more entities (925) as shown in FIG. 2B or a multi entity system (950) as shown in FIG. 3. The multi entity system (950) is particularly suited for multi-period simulations of the expected interaction between two or more entities such as a military campaign or a sales transaction.

Once the entity knowledge has been developed it is reviewed, analyzed, and applied using one or more of the applications in a Complete Context™ Suite (625). These applications are optionally modified to meet user requirements using a Complete Context™ Development System (610). The Complete Context™ Development System (610) supports the maintenance, distribution, integration and synchronization of the newly developed knowledge with applications in the Complete Context™ Suite (625) as well as the creation of newly defined stand-alone applications, services, software and/or bots that utilize said knowledge.

The system of the present invention systematically develops the knowledge required to support the comprehensive analysis of entity performance, develop a shared context to support entity collaboration, simulate entity performance and/or turn data into knowledge. Processing in the entity centric computer system (100) is completed in three steps:

As part of the first stage of processing, the user (20) identifies the subject entity by using existing hierarchies and groups, adding a new hierarchy or group or modifying the existing hierarchies and/or groups as required to fully define the subject entity. As discussed previously, individual entities are defined by being items of one or more entity type, elements associated with one or more entity, entity type event and/or action, resources associated with one or more entity, entity type, event and/or action and combinations thereof. For example, a white blood cell entity is an item with the cell entity type (2108) and an element of the circulatory system and auto-immune system (2303). In a similar fashion, entity Jane Doe could be an item within the organism entity type (2200), an item within the voter entity type (1101), an element of a team entity (1602), an element of a nuclear family entity (1402), an element of an extended family entity (1403) and an element of a household entity (1202). This individual would be expected to have one or more functions and function measures for each entity type he or she is associated with. Separate systems that tried to analyze the six different roles of the individual in each of the six hierarchies would probably save the same data six separate times and use the same data in six different ways. At the same time, all of the work to create these six separate systems might provide very little insight because the complete context for this individuals behavior at any one point in time is a blend of the context associated with each of the different functions he or she is simultaneously performing in the different domains.

After the subject entity definition is completed, structured data and information, transaction data and information, descriptive data and information, unstructured data and information, text data and information, geo-spatial data and information, image data and information, array data and information, web data and information, video data and video information, device data and information, etc. are processed and made available for analysis by converting data formats as required before mapping this data to an entity contextbase (50) in accordance with a common schema, a common ontology or a combination thereof. The automated conversion and mapping of data and information from the existing devices (3) narrow computer-based system databases (5 & 6), external databases (7) and the World Wide Web (8) to a common schema, ontology or combination significantly increases the scale and scope of the analyses that can be completed by users. This innovation also promises to significantly extend the life of the existing narrow systems (4) that would otherwise become obsolete. The uncertainty associated with the data from the different systems is evaluated at the time of integration. Before going further, it should be noted that the entity centric computer system (100) is also capable of operating without completing some or all narrow system database (5 & 6) conversions and integrations as it can accept data that complies with the common schema, common ontology or some combination thereof. The entity centric computer system (100) is also capable of operating without any input from narrow systems. For example, the Complete Context™ Input System (601) (and any other application capable of producing xml documents) is fully capable of providing all required data directly to the entity centric computer system (100).

The entity centric computer system (100) supports the preparation and use of data, information and/or knowledge from the “narrow” systems (4) listed in Tables 4, 5, 6 and 7 and devices (3) listed in Table 8.

TABLE 4
Biomedical affinity chip analyzer, array systems, biochip systems,
Systems bioinformatic systems; biological simulation systems,
clinical management systems; diagnostic imaging systems,
electronic patient record systems, electrophoresis
systems, electronic medication management systems,
enterprise appointment scheduling, enterprise practice
management, fluorescence systems, formulary management
systems, functional genomic systems, gene chip
analysis systems, gene expression analysis systems,
information based medical systems, laboratory
information management systems, liquid chromatography,
mass spectrometer systems; microarray systems; medical
testing systems, molecular diagnostic systems,
nano-string systems; nano-wire systems; peptide mapping
systems, pharmacoeconomic systems, pharmacogenomic
data systems, pharmacy management systems, practice
management, protein biochip analysis systems, protein
mining systems, protein modeling systems, protein
sedimentation systems, protein visualization systems,
proteomic data systems; structural biology systems;
systems biology applications, x*-ylation analysis
systems
*x = methyl, phosphor,

TABLE 5
Personal appliance management systems, automobile management
Systems systems, contact management applications, home
management systems, image archiving applications,
image management applications, media archiving
applications, media applications, media management
applications, personal finance applications,
personal productivity applications (word processing,
spreadsheet, presentation, etc.), personal
database applications, personal and group
scheduling applications, video applications

TABLE 6
Scientific atmospheric survey systems, geological survey systems;
Systems ocean sensor systems, seismographic systems, sensor grids,
sensor networks, smart dust

TABLE 7
Organization accounting systems**; advanced financial systems,
Systems alliance management systems; asset and liability
management systems, asset management systems;
battlefield systems, behavioral risk management
systems; benefits administration systems; brand
management systems; budgeting/financial planning
systems; business intelligence systems; call
management systems; cash management systems;
channel management systems; claims management
systems; command systems, commodity risk
management systems; content management systems;
contract management systems; credit-risk
management systems; customer relationship
management systems; data integration systems;
data mining systems; demand chain systems;
decision support systems; device management
systems document management systems; email
management systems; employee relationship
management systems; energy risk management
systems; expense report processing systems;
fleet management systems; foreign exchange risk
management systems; fraud management systems;
freight management systems; geological survey
systems; human capital management systems; human
resource management systems; incentive management
systems; information lifecycle management
systems, information technology management
systems, innovation management systems;
insurance management systems; intellectual
property management systems; intelligent storage
systems, interest rate risk management systems;
investor relationship management systems;
knowledge management systems; litigation tracking
systems; location management systems; maintenance
management systems; manufacturing execution
systems; material requirement planning systems;
metrics creation system; online analytical
processing systems; ontology systems; partner
relationship management systems; payroll systems;
performance dashboards; performance management
systems; price optimization systems; private
exchanges; process management systems; product
life-cycle management systems; project management
systems; project portfolio management systems;
revenue management systems; risk management
information systems, sales force automation
systems; scorecard systems; sensors (includes
RFID); sensor grids (includes RFID); service
management systems; simulation systems; six-sigma
quality management systems; shop floor control
systems; strategic planning systems; supply chain
systems; supplier relationship management
systems; support chain systems; system management
applications, taxonomy systems; technology chain
systems; treasury management systems;
underwriting systems; unstructured data
management systems; visitor (web site)
relationship management systems; weather risk
management systems; workforce management systems;
yield management systems and combinations thereof
**these typically include an accounts payable system, accounts receivable system, inventory system, invoicing system, payroll system and purchasing system

TABLE 8
Devices personal digital assistants, phones, watches, clocks,
lab equipment, personal computers, refrigerators,
washers, dryers, hvac system controls, gps devices

After data conversion is complete the user (20) is asked to specify entity functions. The user can select from pre-defined functions for each entity or define new functions using narrow system data. Examples of predefined entity functions are shown in Table 9.

TABLE 9
Entity Type: Example Functions
Organism reproduction, killing germs, maintaining blood sugar levels
(2300)
Organization increasing investment value, destroying terrorist networks,
(1600) maintaining full production capacity
Interpersonal income, maintaining standard of living
(1400)
Water Group biomass production, decomposing waste products,
(3600) maintaining ocean salinity in a defined range

Pre-defined quantitative measures can be used if pre-defined functions were used in defining the entity. Alternatively, new measures can be created using narrow system data for one or more entities and/or the system (100) can identify the best fit measures for the specified functions. The quantitative measures can take any form. For many entities the measures are simple statistics like percentage achieving a certain score, average time to completion and the ratio of successful applicants versus failures. Other entities use more complicated measures. For example, Table 10 shows three measures for a medical organization entity—patient element health, patient element longevity and organization financial break even. Commercial businesses generally have a shareholder maximization function that can be effectively analyzed using five measures—a current operation measure, a real option measure, an investment measure, a derivatives (aka leveraged investment) measure and a market sentiment measure. These five measures are pre-defined and available for use in the system of the present invention. The total risk associated with these five measures equals the risk associated with publicly traded equity of the commercial business. Using these pre-defined measures, the risk and return from a commercial business can then be compared to the risk and return offered by other investments and the supply of capital available for these alternative investments. The business return can also be compared to the required return for a given level of risk predicted by pre-defined market behavior models including the capital asset pricing model, the game theoretic capital asset pricing model, arbitrage pricing theory and prospect theory. Providing this background is an important part of defining the complete context for individuals and organizations making capital allocation decision. The entity centric computer system (100) incorporates the ability to use other pre-defined measures including each of the different types of risk—alone or in combination, value at risk, cash flow return on investment, accounting profit and economic profit.

After the data integration, entity definition and measure specification are completed, processing advances to the second stage where context layers for each entity are developed and stored in a contextbase (50). The complete context for evaluating an entities performance can be divided into seven types of context layers. The seven types of layers are:

In any event, we can now use the key terms to better define the seven type's context layers and identify the typical source for the required information as shown below.

The sum of the information from all the specified context layers defines complete context for entity performance by time period. We can use the more precise definition of context to define knowledge. Our revised definition would state that an individual that is knowledgeable about a subject entity has information from all seven context layers for the one or more functions he or she is considering. The knowledgeable individual would be able to use the information from the seven types of context layers to:

TABLE 10
Business Medical
(shareholder value (patient health & longevity,
maximization measure) financial break even measures)
Environment: competitor is Environment: malpractice insurance
trying to form a is increasingly costly
relationship with Acme
Measure: we will receive Measure: survival rate is 99% for
$20 profit per widget also procedure A and 98% for procedure
Acme is a valuable customer B; treatment in first week
and a key supplier, improves 5 year survival 18%, 5 year
relationship damage will reoccurrence rate is 7% higher for
decrease returns and procedure A
increase risk
Relationship: Acme supports Relationship: Dr. X has a commitment
project X in international to assist on another procedure Monday
division
Resource: 25 units are Resource: operating room A time
in inventory available for both procedures
Transaction: need 100 Transaction: patient should be
widgets by Tuesday for treated next week, his insurance
Acme, need to start will cover operation
production Friday
Element: widgets, Element: operating room, operating
warehouse, automated room equipment, Dr. X
lathe

In addition to defining knowledge, context layers are useful in developing management tools. One use of the layers is establishing budgets and/or alert levels for data within a layer or combinations of layers. Using the sample situation illustrated in Table 10, an alert could be established for inventory levels that fall below 25 units in the element layer, for widget commitments that exceed 50 in the transaction layer, profits that drop below $15 per widget or survival rates that drop below 99% in the measure layer. Control can be defined and applied at the transaction and measure levels by assigning priorities to actions and measures. Using this approach the system of the present invention has the ability to analyze and optimize performance using management priorities, historical measures or some combination of the two.

Many analytical applications are limited to optimizing the instant (short-term) impact given the elements, resources and the transaction situation. Because these systems generally ignore uncertainty and the relationship, environment and long term measure portions of complete context, the recommendations they make are often at odds with common sense decisions made by line managers that have a more complete context for evaluating the same data. This deficiency is one reason some have noted that “there is no intelligence in business intelligence applications”. One reason existing systems take this approach is that the information that defines three import parts of complete context—relationship, environment and long term measure impact are not readily available and must be derived as indicated previously. A related shortcoming of some of these systems is that they fail to identify the context or contexts where the results of their analyses are valid.

In one embodiment, the entity centric computer system (100) provides the functionality for integrating data from all narrow systems (4), creating the contextbase (50), developing context frames and supporting Complete Context™ applications as shown in FIG. 12. Over time, the narrow systems (4) can be eliminated and all data can be entered directly into the entity centric computer system (100) as discussed previously. In an alternate mode the system would work in tandem with a Business Process Integration System (99) such as an application server, middleware or extended operating system to integrate data from narrow systems (4), create the contextbase (50), develop context frames and support the Complete Context™ applications as shown in FIG. 13. In either mode, the system of the present invention supports the development and storage of all seven types of context layers as required to create a contextbase (50).

The contextbase (50) also enables the development of new types of analytical reports including a sustainability report and a controllable performance report. The sustainability report combines the element lives, factor lives, risks and an entity performance model to provide an estimate of the time period over which the current entity performance level can be sustained for the specified context frame. There are three paired options for preparing the report—dynamic or static mode, local or indirect mode, risk adjusted or pre-risk mode. In the static mode, the current element and factor mix is “locked-in” and the sustainability report shows the time period over which the current inventory will be depleted. In the dynamic mode the current element and factor inventory is updated using trended replenishment rates to provide a dynamic estimate of sustainability. The local perspective reflects the sustainability of the subject entity in isolation while the indirect perspective reflects the impact of the subject entity on another entity. The indirect perspective is derived by mapping the local impacts to some other entity. The risk adjusted (aka “risk”) and pre-risk modes (aka “no risk”) are self explanatory as they simply reflect the impact of risks on the expected sustainability of subject entity performance. The different possible combinations of these three options define eight modes for report preparation as shown in Table 11.

TABLE 11
Mode Static or Dynamic Local or Indirect Risk or No Risk
1 Static Local Risk
2 Static Local No Risk
3 Static Indirect Risk
4 Static Indirect No Risk
5 Dynamic Local Risk
6 Dynamic Local No Risk
7 Dynamic Indirect Risk
8 Dynamic Indirect No Risk

The sustainability report reflects the expected impact of all context elements and factors on subject entity performance over time. Context elements and context factors are influenced to varying degrees by the subject entity. The controllable performance report identifies the relative contribution of the different context element and factors to the current level of entity performance. It then puts the current level of performance in context by comparing the current level of performance with the performance that would be expected some or all of the elements and factors were all at the mid-point of their normal range—the choice of which elements and factors to modify could be a function of the control exercised by the subject entity. Both of these reports are pre-defined for display using complete Context™ Review System (607) described below.

As discussed previously, context frames are created in the third stage of processing. Context frames are defined by the specified entity function measures and the context layers associated with the entity function measures. The context frame provides all the knowledge required to understand entity behavior and the impact of events, actions, element change, resource change, reference position change and factor change on entity performance (page 26, lines). Sub-context frames are context frames that have been limited to information relevant to a subset of one or more layers. For example, a sub-context frame could include the portion of each of the context layer that was related to a process. Because a process can be defined by a combination of elements, events and resources that produce an action, the information from each layer that was associated with the elements, events, resources and actions that define the process would be included in the sub-context frame for that process. This sub-context frame would provide all the information required to understand process performance and the impact of events, actions, element change and factor change on process performance.

Context frames and sub-context frames are created to support the analysis, forecast, review and/or optimization of entity performance using the applications in the Complete Context™ Suite (625). One of the key benefits of the entity centric computer system (100) is that its architecture allows the Complete Context™ Suite (625) to displace many of the hundred plus systems identified in Table 4 with the Complete Context™ Suite (625) of applications (601, 602, 603, 604, 605, 606, 607, 608, 609, 611, 614, 620, 621 and 622) that provide comprehensive analytical and management capabilities. Another key benefit the Complete Context™ Suite (625) is that each application can use the function measure priorities established by management (41), the priorities inferred from an analysis of entity actions, the priorities that will maximize entity mission achievement or some combination thereof.

The ID to frame table (166) identifies the context frame(s) and/or sub-context frame(s) that will be made available to each user (40), manager (41), subject matter expert (42), and/or collaborator (43) via a portal, portlet, pda, electronic display, paper document or other electronic device with the support of applications in the Complete Context Suite (625). It is worth noting that this context awareness by user is also used to provide a true natural language interface (714) to the system (100) and applications (610 and 625) of the present invention. This capability can also be used to filter and/or prioritize e-mail based on relevance to available context. Another novel feature of the Complete Context™ Suite (625) is that the applications in the suite can review entity context frames from prior time periods to generate reports that highlight changes over time and display the range of contexts under which the results they produce are valid. Because there are many dimensions to context we call this range of contexts where results are valid the valid context space. The applications in the Complete Context™ Suite (625) also support the development of customized applications or services. They do this by providing ready access to the internal logic of the application while at the same time protecting this logic from change. This feature allows each user (40) to get the precise information required for his or her specific needs while preserving the ability to upgrade the applications at a later date in an automated fashion. As with the other software (200, 300, 400 and 700) in the system of the present invention, each of these applications can run under several different architectures—agent, bot, applet, web service, grid service, n-tier client server, stand alone application, etc. Finally, it should be noted that each of the applications in the Suite (625) supports the use of a spatial coordinate system for displaying the results of their processing when one is specified for use by the user (40). Other features of the applications in the Complete Context™ Suite (625) are briefly described below:

The entity centric computer system (100) takes a novel approach to developing the knowledge required to monitor and manage performance. Narrow systems (4) generally try to develop a picture of how part of an entity is performing. The user (40) can then be left with an enormous effort to integrate these different parts—often developed from different perspectives—to form a complete picture of performance. By way of contrast, the entity centric computer system (100) develops complete pictures of entity performance for all defined functions in a common format, saves these pictures in the contextbase (50) before dividing and recombining these pictures with other pictures as required to provide the detailed information regarding any portion of the entity that is being analyzed or reviewed. The detailed information is then packaged in a context frame or sub-context frame that is used by the standard applications in any variety of combinations for analysis processing. The contextbase (50) is continually updated by the software in the entity centric computer system (100). As a result, changes in each and every context layer are automatically discovered and incorporated into the processing and analysis completed by the entity centric computer system (100). Developing the complete picture first, instead of trying to put it together from dozens of different pieces can allow the system of the present invention to reduce IT infrastructure complexity by up to an order of magnitude while dramatically increasing the ability to analyze and manage entity performance. The ability to use the same system to analyze, manage, review and optimize performance of entities at different levels within a domain hierarchy and entities from a wide variety of different domains further magnifies the benefits associated with the simplification enabled by the system of the present invention.

The entity centric computer system (100) provides several other important features, including:

To illustrate the use of the entity centric computer system (100) we will describe the use of the applications in the Complete Context™ Suite to support a mental health clinic (an organization entity that becomes an element of the patient entity) in treating a patient (an organism entity that becomes an element of the mental health clinic entity). The mental health clinic has the same measure described in table 10 for a medical facility. The patient is referred to the mental health clinic with an MDD (major depressive disorder) single episode diagnosis. After arriving at the clinic, he fills out a form that details his medical history. His medical history indicates that he has high blood pressure and that he is taking medication. After the form is filled out the patient has his weight and blood pressure checked by an aide before seeing a doctor. The doctor reviews the patient's information, examines the patient and prescribes a treatment before moving on to see the next patient.

In the narrative that follows we will detail the support provided by the entity centric computer system (100) for each step in the patient visit and the subsequent follow up. The narrative assumes that the system was installed some time ago and has completed the processing required to develop a complete ontology and contextbase (50) for the clinic. Data entry can be completed in a number of ways for each step in the visit. The most direct route would be to use the Complete Context™ Input System (601) or any xml compliant application (such as newer Microsoft and Adobe applications) with a pc or personal digital assistant to capture information obtained during the visit using the natural language interface (714) or a pre-defined form. Once the data is captured it is integrated with the contextbase (50) in an automated fashion. A paper form could be used for mental health service facilities that do not have the ability to provide pc or pda access to patients. This paper form can be transcribed or scanned and converted into an xml document where it could be integrated with the contextbase (50) in an automated fashion. If the patient has used an entity centric computer system (100) that stored data related to his or her health, then this information could be communicated to the system (100) in an automated fashion via wireless connectivity, wired connectivity or the transfer of files from the patient's system (100) to a recordable media. Recognizing that there are a number of options for completing data entry we will simply say that “data entry is completed” when describing each step.

Before selecting a process map, the doctor could activate the Complete Context™ Analysis application (602) to review the expected instant impacts and outcomes from different combinations of procedures and treatments that are available under the current formulary. This information could be used to support the development of a new process map (if entity policy permits this). In any event, after the doctor selects a process map for the treatment of the specified diagnosis, the associated process commitments and alerts are associated with the patient and stored in the transaction layer. The required paperwork is automatically generated by the process map and signed as required by the doctor.

In short, the Complete Context™ applications (625) provide knowledgeable support to those trying to analyze, manage and/or optimize actions, processes and outcomes for any entity. The contextbase (50), is the one of keys to the effectiveness of the Complete Context™ applications described above. The contextbase (50) provides six important benefits:

TABLE 12
Organization hierarchy of measure performance drivers
Organization finds Division A is
biggest contributor to measure
performance
Division A finds Corporate University
training is biggest contributor to
measure performance
Corporate University department
identifies the Sally Mack as biggest
contributor to measure performance

Using an overall system for evaluating measure performance, each of the three performance drivers: Division A, the Corporate University and Sally Mack would be identified. However, because their contributions to measure performance are closely inter-related it would be difficult to identify their separate contributions using an overall analysis. A better use of the results from an overall analysis in an environment where there is a hierarchy associated with the entity is to ensure that there is a consistent alignment between the measures used at each level. For example, if the Corporate University system had identified John Black as the strongest contributor, then the Corporate University measures would clearly be out of alignment with the higher level measures that identified Sally Mack as the strongest contributor. The Corporate University measures would need to be adjusted to bring their measures into alignment with the overall measure (unless, of course, John Black is related to the CEO). Because efforts to achieve alignment have previously relied exclusively on management opinion and subjective measures like scorecards, some have concluded that achieving ongoing alignment is “impossible”. While it may or may not have been impossible, the innovative system of the present invention provides an automated mechanism for establishing and maintaining alignment between different levels of a hierarchy for any entity with one or more defined functions that have defined measures. This same mechanism can be used for aligning the operation of every level with a hierarchy in accordance with the priorities established by the management team.

Some of the important features of the entity centric approach are summarized in Table 13.

TABLE 13
Entity Centric
Characteristic System (100) Approach
Tangible benefit Built in
Computation/ Partitioned
Search Space
Ontology Development Automatic
and Maintenance
Ability to analyze new Automatic - learns from data
element, resource or factor
Measures in alignment Automatic
Data in context Automatic
System Longevity Equal to longevity
of definable measure(s)

To facilitate its use as a tool for improving performance, the entity centric computer system (100) produces reports in formats that are graphical and highly intuitive. By combining this capability with the previously described capabilities for: developing knowledge, flexibly defining robust performance measures, ensuring alignment, optimizing performance, reducing IT complexity and facilitating collaboration, the entity centric computer system (100) gives individuals, groups and entity managers the tools they need to model, manage and improve the performance of any entity with one or more defined measures. Before going further it is worth noting that the entity centric focus of the system of the present invention (100) could be easily modified to support the development of knowledge for an entity group or population by incorporating the ability to adjust the computation of statistics to account for different sample sizes in an automated fashion.

These and other objects, features and advantages of the present invention will be more readily apparent from the following description of one embodiment of the invention in which:

FIG. 1 is a block diagram showing the major processing steps of the present invention;

FIG. 2A and FIG. 2B are block diagrams showing a relationship of elements, events, factors, processes and subject entity measures;

FIG. 3 is a block diagram showing one type of multi-entity system;

FIG. 4 is a diagram showing the tables in the contextbase (50) of the present invention that are utilized for data storage and retrieval during the processing in the;

FIG. 5 is a block diagram of an implementation of the present invention;

FIG. 6A, FIG. 6B and FIG. 6C are block diagrams showing the sequence of steps in the present invention used for specifying system settings, preparing data for processing and specifying the entity measures;

FIG. 7A, FIG. 7B, FIG. 7C, FIG. 7D, FIG. 7E, FIG. 7F, FIG. 7G and FIG. 7H are block diagrams showing the sequence of steps in the present invention used for creating a contextbase (50) for a subject entity;

FIG. 8A and FIG. 8B are block diagrams showing the sequence in steps in the present invention used in defining context frames, creating bots, applications and performance reports;

FIG. 9 is a diagram showing the data windows that are used for receiving information from and transmitting information via the interface (700);

FIG. 10 is a block diagram showing the sequence of processing steps in the present invention used for identifying, receiving and transmitting data with narrow systems (4);

FIG. 11 is a sample report showing the efficient frontier for Entity XYZ and the current position of XYZ relative to the efficient frontier;

FIG. 12 is a diagram showing one embodiment of the entity centric computer system (100) and the Complete Context™ Suite (625);

FIG. 13 is a diagram showing how the entity centric computer system (100) can be integrated with a business process integration platform (99) such as an application server;

FIG. 14 is a block diagram showing a relationship between different members of a hierarchy;

FIG. 15 is a diagram showing the format of a standard management report;

FIG. 16 is a diagram showing a portion of a process map for treating a mental health patient;

FIG. 17 is a diagram showing how the system (100) develops and supports a natural language interface (714);

FIG. 1 provides an overview of the processing completed by the innovative system for entity centric computing. In accordance with the present invention, an automated system (100) and method for developing a contextbase (50) that contains up to seven types of context layers for each entity measure is provided. Processing starts in this system (100) when the data preparation portion of the application software (200) extracts data from a narrow system database (5); an external database (7); a world wide web (8) and optionally, a partner narrow system database (10) via a network (45). The World Wide Web (8) also includes the semantic web that is being developed. Data may also be obtained from a Complete Context™ Input System (601) or any other application that can provide xml output via the network (45) in this stage of processing. For example, newer versions of Microsoft® Office and Adobe® Acrobat® can be used to provide data input to the system (100) of the present invention.

After data is prepared, entity functions are defined and entity measures are identified, the contextbase (50) is developed by the second part of the application software (300). The entity contextbase (50) is then used by the context frame portion of the application software (400) to create context frames for use by the applications in the Complete Context™ Suite (625) and the Complete Context™ programming system (610). The processing completed by the system (100) may be influenced by a user (40) or a manager (41) through interaction with a user-interface portion of the application software (700) that mediates the display, transmission and receipt of all information to and from a browser software (800) such as the Netscape Navigator® or the Microsoft Internet Explorer® in an access device (90) such as a phone, personal digital assistant or personal computer where data are entered by the user (40). The user (40) and/or manager can also use a natural language interface (714) provided by the system (100) to interact with the system.

While only one database of each type (5, 6 and 7) is shown in FIG. 1, it is to be understood that the system (100) can process information from all narrow systems (4) listed in Table 4 for each entity being supported. In one embodiment, all functioning narrow systems (4) within each entity will provide data to the system (100) via the network (45). It should also be understood that it is possible to complete a bulk extraction of data from each database (5, 6 and 7) and the World Wide Web (8) via the network (45) using peer to peer networking and data extraction applications. The data extracted in bulk could be stored in a single datamart, a data warehouse or a storage area network where the analysis bots in later stages of processing could operate on the aggregated data. A virtual database that would leave all data in the original databases where it could be retrieved and optionally converted as required for calculations by the analysis bots over a network (45) can also be used.

The operation of the system of the present invention is determined by the options the user (40) and manager (41) specify and store in the contextbase (50). As shown in FIG. 4, the contextbase (50) contains tables for storing extracted information by context layer including: a key terms table (140), a element layer table (141), a transaction layer table (142), an resource layer table (143), a relationship layer table (144), a measure layer table (145), a unassigned data table (146), an internet linkage table (147), a causal link table (148), an environment layer table (149), an uncertainty table (150), a context space table (151), an ontology table (152), a report table (153), a spatial reference layer table (154), a hierarchy metadata table (155), an event risk table (156), an entity schema table (157), an event model table (158), a requirement table (159), a context frame table (160), a context quotient table (161), a system settings table (162), a bot date table (163), a Thesaurus table (164), an id to frame table (165), an impact model table (166), a bot assignment table (167), a scenarios table (168) and a natural language table (169). The contextbase (50) can exist as a database, datamart, data warehouse, a virtual repository, a virtual database or storage area network. The system of the present invention has the ability to accept and store supplemental or primary data directly from user input, a data warehouse, a virtual database, a data preparation system or other electronic files in addition to receiving data from the databases described previously. The system of the present invention also has the ability to complete the necessary calculations without receiving data from one or more of the specified databases. However, in one embodiment all required information is obtained from the specified data sources (5, 6, 7, 8 and 601) for the subject entity.

As shown in FIG. 5, an embodiment of the present invention is a computer system (100) illustratively comprised of a user-interface personal computer (110) connected to an application-server personal computer (120) via a network (45). The application-server personal computer (120) is in turn connected via the network (45) to a database-server personal computer (130). The user interface personal computer (110) is also connected via the network (45) to an Internet browser appliance (90) that contains browser software (800) such as Microsoft Internet Explorer® or Netscape Navigator®.

In this embodiment, the database-server personal computer (130) has a read/write random access memory (131), a hard drive (132) for storage of the contextbase (50), a keyboard (133), a communication bus (134), a display (135), a mouse (136), a CPU (137), a printer (138) and a cache (139). The application-server personal computer (120) has a read/write random access memory (121), a hard drive (122) for storage of the non-user-interface portion of the entity section of the application software (200, 300 and 400) of the present invention, a keyboard (123), a communication bus (124), a display (125), a mouse (126), a CPU (127), a printer (128) and a cache (129). While only one client personal computer is shown in FIG. 5, it is to be understood that the application-server personal computer (120) can be networked to a plurality of client, user-interface personal computers (110) via the network (45). The application-server personal computer (120) can also be networked to a plurality of server, personal computers (130) via the network (45). It is to be understood that the diagram of FIG. 5 is merely illustrative of one embodiment of the present invention as the system of the present invention could operate with the support of a single computer, any number of networked computers, any number of virtual computers, any number of clusters, a computer grid and some combination thereof.

The user-interface personal computer (110) has a read/write random access memory (111), a hard drive (112) for storage of a client data-base (49) and the user-interface portion of the application software (700), a keyboard (113), a communication bus (114), a display (115), a mouse (116), a CPU (117), a printer (118) and a cache (119).

The application software (200, 300 and 400) controls the performance of the central processing unit (127) as it completes the calculations required to support Complete Context™ development. In the embodiment illustrated herein, the application software program (200, 300 and 400) is written in a combination of Java, C# and C++. The application software (200, 300 and 400) can use Structured Query Language (SQL) for extracting data from the databases and the World Wide Web (5, 6, 7 and 8). The user (40) and manager (41) can optionally interact with the user-interface portion of the application software (700) using the browser software (800) in the browser appliance (90) or through a natural language interface (714) provided by the system (100) to provide information to the application software (200, 300 and 400) for use in determining which data will be extracted and transferred to the contextbase (50) by the data bots.

User input is initially saved to the client database (49) before being transmitted to the communication bus (124) and on to the hard drive (122) of the application-server computer via the network (45). Following the program instructions of the application software, the central processing unit (127) accesses the extracted data and user input by retrieving it from the hard drive (122) using the random access memory (121) as computation workspace in a manner that is well known.

The computers (110, 120, 130) shown in FIG. 5 illustratively are personal computers or workstations that are widely available for use with Linux, Unix or Windows operating systems. Typical memory configurations for client personal computers (110) used with the present invention should include at least 1028 megabytes of semiconductor random access memory (111) and at least a 200 gigabyte hard drive (112). Typical memory configurations for the application-server personal computer (120) used with the present invention should include at least 5128 megabytes of semiconductor random access memory (121) and at least a 300 gigabyte hard drive (122). Typical memory configurations for the database-server personal computer (130) used with the present invention should include at least 5128 megabytes of semiconductor random access memory (131) and at least a 750 gigabyte hard drive (132).

Using the system described above, data is extracted from the narrowly focused entity systems (4), external databases (7) and the World Wide Web (8) as required to develop a contextbase (50), develop context frames and manage performance. In this invention, analysis bots are used to determine context element lives and the percentage of measure performance that is attributable to each context element. The resulting values are then added together to determine the contribution of each context element to the measure performance. Context factor contributions and risk impacts are calculated in a similar manner, however, they may not have defined lives.

As discussed previously, the entity centric computer system (100) completes processing in three distinct stages. As shown in FIG. 6A, FIG. 6B and FIG. 6C the first stage of processing (block 200 from FIG. 1) identifies and prepares data from narrow systems (4) for processing, identifies the entity and entity function measures. As shown in FIG. 7A, FIG. 7B, FIG. 7C, FIG. 7D, FIG. 7E, FIG. 7F, FIG. 7G and FIG. 7H the second stage of processing (block 300 from FIG. 1) develops and then continually updates a contextbase (50) by subject entity measure. As shown in FIG. 8A and FIG. 8B, the third stage of processing (block 400 from FIG. 1) identifies the valid context space, prepares context frames, distributes context frames and sub-context frames using a variety of mechanisms and optionally prepares and print reports. If the operation is continuous, then the processing steps described are repeated continuously. As described below, one embodiment of the software is a bot or agent architecture. Other architectures including a web service architecture, a grid service architecture, an n-tier client server architecture, an integrated application architecture and some combination thereof can be used to the same effect.

The flow diagrams in FIG. 6A, FIG. 6B and FIG. 6C detail the processing that is completed by the portion of the application software (200) that defines the subject entity, identifies the functions and measures for said entity and establishes a virtual database for data from other systems that is available for processing, prepares unstructured data for processing and accepts user (40) and management (41) input. As discussed previously, the system of the present invention is capable of accepting data from all the narrow systems (4) listed in Tables 4, 5, 6 and 7. Data extraction, processing and storage are normally completed by the entity centric computer system (100). This data extraction, processing and storage can be facilitated by a separate data integration layer as described in cross referenced application Ser. No. 99/999,999. Operation of the system (100) will be illustrated by describing the extraction and use of structured data from a narrow system database (5) for supply chain management and an external database (7). A brief overview of the information typically obtained from these two databases will be presented before reviewing each step of processing completed by this portion (200) of the application software.

Supply chain systems are one of the narrow systems (4) identified in Table 7. Supply chain databases are a type of narrow system database (5) that contain information that may have been in operation management system databases in the past. These systems provide enhanced visibility into the availability of resources and promote improved coordination between subject entities and their supplier entities. All supply chain systems would be expected to track all of the resources ordered by an entity after the first purchase. They typically store information similar to that shown below in Table 14.

TABLE 14
Supply chain system information
1. Stock Keeping Unit (SKU)
2. Vendor
3. Total quantity on order
4. Total quantity in transit
5. Total quantity on back order
6. Total quantity in inventory
7. Quantity available today
8. Quantity available next 7 days
9. Quantity available next 30 days
10. Quantity available next 90 days
11. Quoted lead time
12. Actual average lead time

External databases (7) are used for obtaining information that enables the definition and evaluation of context elements, context factors and event risks. In some cases, information from these databases can be used to supplement information obtained from the other databases and the World Wide Web (5, 6 and 8). In the system of the present invention, the information extracted from external databases (7) includes the data listed in Table 15.

TABLE 15
External database information
1. Text information such as that found in the Lexis Nexis database;
2. Text information from databases containing past issues of
specific publications;
3. Multimedia information such as video and audio clips;
4. Idea market prices indicate likelihood of certain events
occurring; and
4. Other event risk data including information about risk
probability and magnitude for weather and geological events

System processing of the information from the different databases (5, 6 and 7) and the World Wide Web (8) described above starts in a block 202, FIG. 6A. The software in block 202 prompts the user (40) via the system settings data window (701) to provide system setting information. The system setting information entered by the user (40) is transmitted via the network (45) back to the application-server (120) where it is stored in the system settings table (162) in the contextbase (50) in a manner that is well known. The specific inputs the user (40) is asked to provide at this point in processing are shown in Table 16.

TABLE 16*
1. Continuous, if yes, calculation frequency? (by minute,
hour, day, week, etc.)
2. Subject Entity (hierarchy or group member, collaboration
or multi domain/entity system)
3. SIC Codes
4. Names of primary competitors by SIC Code
5. Base account structure
6. Base units of measure
7. Base currency
8. Risk free interest rate
9. Program bots or applications? (yes or no)
10. Process measurements? (yes or no)
11. Probabilistic relational models? (yes or no)
12. Knowledge capture and/or collaboration? (yes or no)
13. Natural language interface? (yes, no or voice
activated)
14. Video data extraction? (yes or no)
15. Imaging data extraction? (yes or no)
16. Internet data extraction? (yes or no)
17. Reference layer (yes or no, if yes specify coordinate
system(s))
18. Text data analysis? (if yes, then specify maximum
number of relevant words)
19. Geo-coded data? (if yes, then specify standard)
20. Maximum number of clusters (default is six)
21. Management report types (text, graphic or both)
22. Default missing data procedure (chose from selection)
23. Maximum time to wait for user input
24. Maximum number of sub elements
25. Most likely scenario, normal, extreme or mix (default is
normal)
26. System time period (days, month, years, decades, light
years, etc.)
27. Date range for history-forecast time periods (optional)
28. Uncertainty by narrow system type (optionally, default is
zero)
29. Uncertainty source for systems above zero (i.e. forecast,
technology limitation, reliability, etc.)

The system settings data are used by the software in block 202 to establish context layers. As described previously, there are seven types of context layers for the subject entity. The application of the remaining system settings will be further explained as part of the detailed explanation of the system operation. The software in block 202 also uses the current system date and the system time period saved in the system settings table (162) to determine the time periods (generally in months) where data will be sought to complete the calculations. The user (40) also has the option of specifying the time periods that will be used for system calculations. After the date range is stored in the system settings table (162) in the contextbase (50), processing advances to a software block 203.

The software in block 203 prompts the user (40) via the entity data window (702) to identify the subject entity, identify subject entity functions and identify any extensions to the subject entity hierarchy or hierarchies specified in the system settings table (162). For example if the organism hierarchy (23) was chosen, the user (40) could extend the hierarchy by specifying a join with the cell hierarchy (21). As part of the processing in this block, the user (40) is also given the option to modify the subject entity hierarchy or hierarchies. If the user (40) elects to modify one or more hierarchies, then the software in the block will prompt the user (40) to provide the information required to modify the pre-defined hierarchy metadata in the hierarchy metadata table (155) to incorporate the modifications. The user (40) can also elect to limit the number of separate levels that are analyzed below the subject entity in a given hierarchy. For example, an organization could choose to examine the impact of their divisions on organization performance by limiting the context elements to one level below the subject entity. After the user (40) completes the specification of hierarchy extensions, modifications and limitations, the software in block 203 selects the appropriate metadata from the hierarchy metadata table (155) and establishes the entity schema, ontology and metadata (157). The software in block 203 uses the extensions, modifications and limitations together with three rules for establishing the entity schema:

The software in block 204 prompts a system interface (711) to communicate via a network (45) with the different databases (5, 6, and 7) and the World Wide Web (8) that are data sources for the entity centric computer system (100). As shown on FIG. 10 the system interface (711) consists of a multiple step operation where the sequence of steps depends on the nature of the interaction and the data being provided to the system (100). In one embodiment, a data input session would be managed by the a software block (720) that identifies the data source (3, 4, 5, 6, 7 or 8) using standard protocols such as UDDI or xml headers, maintains security and establishes a service level agreement with the data source (3, 4, 5, 6, 7 or 8). The data provided at this point would include transaction data, descriptive data, imaging data, video data, text data, sensor data geospatial data, array data and combinations thereof. The session would proceed to a software block (722). If the data provided by the data source (3, 4, 5, 6, 7 or 8) was in xml format that complied with the entity schema, then the data would not require translation and the session would advanced to a software block (724) that would determine that the metadata associated with the data was in alignment with the entity schema stored in the entity schema table (157). The session would proceed to a software block (732) where any conversions to match the base units of measure, currency or time period specified in the system settings table (162) would be identified before the session advanced to a software block (734) where the location of this data would be mapped to the appropriate context layers and stored in the contextbase (50). Establishing a virtual database in this manner eliminates the latency that can cause problems for real time processing. The virtual database information for the element layer for the subject entity and context elements is stored in the element layer table (141) in the contextbase (50). The virtual database information for the resource layer for the subject entity resources is stored in the resource layer table (143) in the contextbase (50). The virtual database information for the environment layer for the subject entity and context factors is stored in the environment layer table (149) in the contextbase (50). The virtual database information for the transaction layer for the subject entity, context elements, actions and events is stored in the transaction layer table (142) in the contextbase (50). The processing path described in this paragraph is just one of many paths for processing data input.

As shown FIG. 10, the system interface (711) has provisions for an alternate data input processing path. This path is used if the data is not in the proper format. In this alternate mode, the data input session would still be managed by the session management software in block (720) that identifies the data source (3, 4, 5, 6, 7 or 8) maintains security and establishes a service level agreement with the data source (3, 4, 5, 6, 7 or 8). The session would proceed to the translation software block (722) where the data from one or more data sources (5, 6, 7 or 8) requires translation and optional analysis before proceeding to the next step. The software in block 722 has provisions for translating and parsing audio, image, micro-array, video and unformatted text data formats to xml. The audio, text and video data are prepared as detailed in cross referenced patent Ser. No. 99/999,999. After translation is complete, the session advances to a software block (724) that would determine that the metadata associated with the data was not in alignment with the schema stored in the entity schema table (157). Processing then advances to the software in block 736 which would use a series of schema matching algorithms including key properties, similarity, global namespace, value pattern and value range algorithms to align the input data schema with the entity schema schema. Processing, then advances to a software block 738 where the metadata associated with the data is compared with the schema stored in the entity schema table (157). If the metadata is aligned, then processing is completed using the path described previously. Alternatively, if the metadata is still not aligned, then processing advances to a software block 740 where joins and intersections between the two schemas are completed. Processing advances then advances to a software block 742 where the results of these operations are compared with the schema stored in the entity schema table (157). If the metadata from one of these operations is aligned, then processing is completed using the path described previously. Alternatively, if the metadata is still not aligned, then processing advances to a software block 742 where the schemas are checked for partial alignment. If there is partial alignment, then processing advances to a software block 744. Alternatively, if there is no alignment, then processing advances to a software block 748 where the data is tagged for manual review and stored in the unassigned data table (146). The software in block 744 cleaves the data as required to separate the portion that is in alignment from the portion that is not in alignment. The portion of the data that is not in alignment is forwarded to software block 748 where it is tagged for manual alignment and stored in the unassigned data table (146). The portion of the data that is in alignment is processed using the path described previously.

After system interface (711) processing is completed for all available data from the sources (3 and 4), databases (5, 6 and 7) and the World Wide Web (8), processing advances to a software block 206 where the software in block 206 optionally prompts the system interface (711) to communicate via a network (45) with the Complete Context™ Input System (601). The system interface uses the path described previously for data input to map the identified data to the appropriate context layers and store the mapping information in the contextbase (50) as described previously. After storage of the Complete Context™ Input System (601) related information is complete, processing advances to a software block 207.

The software in block 207 prompts the user (40) via the review data window (703) to optionally review the context layer data that has been stored in the first few steps of processing. The user (40) has the option of changing the data on a one time basis or permanently. Any changes the user (40) makes are stored in the table for the corresponding context layer (i.e. transaction layer changes are saved in the transaction layer table (142), etc.). As part of the processing in this block, an interactive GEL algorithm prompts the user (40) via the review data window (703) to check the hierarchy or group assignment of any new elements, factors and resources that have been identified. Any newly defined categories are stored in the relationship layer table (144) and the entity schema table (157) in the contextbase (50) before processing advances to a software block 208.

The software in block 208 prompts the user (40) via the requirement data window (710) to optionally identify requirements for the subject entity. Requirements can take a variety of forms but the two most common types of requirements are absolute and relative. For example, a requirement that the level of cash should never drop below $50,000 is an absolute requirement while a requirement that there should never be less than two months of cash on hand is a relative requirement. The user (40) also has the option of specifying requirements as a subject entity function later in this stage of processing. Examples of different requirements are shown in Table 17.

TABLE 17
Entity Requirement (reason)
Individual (1401) Stop working at 67
Keep blood pressure below 155/95
Available funds > $X by Jan. 1, 2014
Government Foreign currency reserves > $X (IMF requirement)
Organization (1607) 3 functional divisions on standby (defense)
Pension assets > liabilities (legal)
Circulatory System Cholesterol level between 120 and 180
(2304) Pressure between 110/75 and 150/100

The software in this block provides the ability to specify absolute requirements, relative requirements and standard “requirements” for any reporting format that is defined for use by the Complete Context™ Review System (i.e. Basel II, FASB earnings, etc.). After requirements are specified, they are stored in the requirement table (159) in the contextbase (50) by entity before processing advances to a software block 211.

The software in block 211 checks the unassigned data table (146) in the contextbase (50) to see if there is any data that has not been assigned to an entity and/or context layer. If there is no data without a complete assignment (entity and element, resource, factor or transaction context layer constitutes a complete assignment), then processing advances to a software block 214. Alternatively, if there are data without an assignment, then processing advances to a software block 212. The software in block 212 prompts the user (40) via the identification and classification data window (705) to identify the context layer and entity assignment for the data in the unassigned data table (146). After assignments have been specified for every data element, the resulting assignments are stored in the appropriate context layer tables in the contextbase (50) by entity before processing advances to a software block 214.

The software in block 214 checks the element layer table (141), the transaction layer table (142) and the resource layer table (143) and the environment layer table (149) in the contextbase (50) to see if data is missing for any required time period. If data is not missing for any required time period, then processing advances to a software block 218. Alternatively, if data for one or more of the required time periods identified in the system settings table (162) for one or more items is missing from one or more context layers, then processing advances to a software block 216. The software in block 216 prompts the user (40) via the review data window (703) to specify the procedure that will be used for generating values for the items that are missing data by time period. Options the user (40) can choose at this point include: the average value for the item over the entire time period, the average value for the item over a specified time period, zero or the average of the preceding item and the following item values and direct user input for each missing value. If the user (40) does not provide input within a specified interval, then the default missing data procedure specified in the system settings table (162) is used. When the missing time periods have been filled and stored for all the items that were missing data, then system processing advances to a block 218.

The software in block 218 retrieves data from the element layer table (141), the transaction layer table (142) and the resource layer table (143) and the environment layer table (149). It uses this data to calculate pre-defined indicators for the data associated with each element, resource and environmental factor. The indicators calculated in this step are comprised of comparisons, regulatory measures and statistics. Comparisons and statistics are derived for: appearance, description, numeric, shape, shape/time and time characteristics. These comparisons and statistics are developed for different types of data as shown below in Table 18.

TABLE 18
Characteristic/ Appear- Descrip- Nu- Shape-
Data type ance tion meric Shape Time Time
audio X X X
coordinate X X X X X
image X X X X X
text X X X
transaction X X
video X X X X X
X = comparisons and statistics are developed for these characteristic/data type combinations

Numeric characteristics are pre-assigned to different domains. Numeric characteristics include amperage, area, density, depth, distance, hardness, height, hops, impedance, level, nodes, quantity, rate, resistance, speed, tensile strength, voltage, volume, weight and combinations thereof. Time characteristics include frequency measures, gap measures (i.e. time since last occurrence, average time between occurrences, etc.) and combinations thereof. The numeric and time characteristics are also combined to calculate additional indicators. Comparisons include: comparisons to baseline (can be binary, 1 if above, 0 if below), comparisons to external expectations, comparisons to forecasts, comparisons to goals, comparisons to historical trends, comparisons to known bad, comparisons to known good, life cycle comparisons, comparisons to normal, comparisons to peers, comparisons to regulations, comparison to requirements, comparisons to a standard, sequence comparisons, comparisons to a threshold (can be binary, 1 if above, 0 if below) and combinations thereof. Statistics include: averages (mean, median and mode), convexity, copulas, correlation, covariance, derivatives, slopes, trends and variability. Time lagged versions of each piece of data, each statistic, each comparison are also developed. The numbers derived from these calculations are collectively referred to as “indicators” (also known as item performance indicators and factor performance indicators). The software in block 218 also calculates pre-specified mathematical and/or logical combinations of variables called composite variables (also known as composite factors when associated with environmental factors). The indicators and the composite variables are tagged and stored in the appropriate context layer table—the element layer table (141), the resource layer table (143) or the environment layer table (149) before processing advances to a software block 220.

The software in block 220 uses attribute derivation algorithms such as the AQ program to create combinations of variables from the element layer table (141), the transaction layer table (142) and the resource layer table (143) and the environment layer table (149) that were not pre-specified for combination in the prior processing step. While the AQ program is used in an embodiment of the present invention, other attribute derivation algorithms, such as the LINUS algorithms, may be used to the same effect. The resulting composite variables are tagged and stored in the element layer table (141), the resource layer table (143) or the environment layer table (149) before processing advances to a software block 222.

The software in block 222 checks the bot date table (163) and deactivates pattern bots with creation dates before the current system date and retrieves information from the system settings table (162), the element layer table (141), the transaction layer table (142), the resource layer table (143) and the environment layer table (149). The software in block 222 then initializes pattern bots for each layer to identify patterns in each layer. Bots are independent components of the application software of the present invention that complete specific tasks. In the case of pattern bots, their tasks are to identify patterns in the data associated with each context layer. In one embodiment, pattern bots use Apriori algorithms identify patterns including frequent patterns, sequential patterns and multi-dimensional patterns. However, a number of other pattern identification algorithms including the sliding window algorithm; beam-search, frequent pattern growth, decision trees and the PASCAL algorithm can be used alone or in combination to the same effect. Every pattern bot contains the information shown in Table 19.

TABLE 19
1. Unique ID number (based on date, hour, minute, second of creation)
2. Creation date (date, hour, minute, second)
3. Storage location
4. Entity Type(s)
5. Entity
6. Context Layer
7. Algorithm

After being initialized, the bots identify patterns for the data associated with elements, resources, factors and combinations thereof. Each pattern is given a unique identifier and the frequency and type of each pattern is determined. The numeric values associated with the patterns are indicators. The values are stored in the appropriate context layer table before processing advances to a software block 224.

The software in block 224 uses causal association algorithms including LCD, CC and CU to identify causal associations between indicators, composite variables, element data, factor data, resource data and events, actions, processes and measures. The identified associations are stored in the causal link table (148) for possible addition to the relationship layer table (144) before processing advances to a software block 226.

The software in block 226 prompts the user (40) via the review data window (703) to review the associations stored in the causal link table (148). Associations that have already been specified or approved by the user (40) will not be displayed. The user (40) has the option of accepting or rejecting each identified association. Any associations the user (40) accepts are stored in the relationship layer table (144) before processing advances a software block 242.

The software in block 242 checks the measure layer table (145) in the contextbase (50) to determine if there are current models for all measures for every entity. If all measure models are current, then processing advances to a software block 301. Alternatively, if all measure models are not current, then the next measure for the next entity is selected and processing advances to a software block 244.

The software in block 244 checks the bot date table (163) and deactivates event risk bots with creation dates before the current system date. The software in the block then retrieves the information from the transaction layer table (142), the relationship layer table (144), the event risk table (156), the entity schema table (157) and the system settings table (162) as required to initialize event risk bots for the subject entity in accordance with the frequency specified by the user (40) in the system settings table (162). Bots are independent components of the application software that complete specific tasks. In the case of event risk bots, their primary tasks are to forecast the frequency and magnitude of events that are associated with negative measure performance in the relationship layer table (144). In addition to forecasting risks that are traditionally covered by insurance such as fires, floods, earthquakes and accidents, the system of the present invention also uses the data to forecast standard, “non-insured” event risks such as the risk of employee resignation and the risk of customer defection. The system of the present invention uses a tournament forecasting method for event risk frequency and duration. The mapping information from the relationship layer is used to identify the elements, factors, resources and/or actions that will be affected by each event. Other forecasting methods can be used to the same effect. Every event risk bot contains the information shown in Table 20.

TABLE 20
1. Unique ID number (based on date, hour, minute, second of creation)
2. Creation date (date, hour, minute, second)
3. Mapping information
4. Storage location
5. Hierarchy of Group
6. Entity
7. Event (fire, flood, earthquake, tornado, accident, defection, etc.)

After the event risk bots are initialized they activate in accordance with the frequency specified by the user (40) in the system settings table (162). After being activated the bots retrieve the required data and forecast the frequency and measure impact of the event risks. The resulting forecasts are stored in the event risk table (156) before processing advances to a software block 246.

The software in block 246 checks the bot date table (163) and deactivates extreme risk bots with creation dates before the current system date. The software in block 246 then retrieves the information from the transaction layer table (142), the relationship layer table (144), the event risk table (156), the entity schema table (157) and the system settings table (162) as required to initialize extreme risk bots in accordance with the frequency specified by the user (40) in the system settings table (162). Bots are independent components of the application software that complete specific tasks. In the case of extreme risk bots, their primary task is to forecast the probability of extreme events for events that are associated with negative measure performance in the relationship layer table (144). The extreme risks bots use the Blocks method and the peak over threshold method to forecast extreme risk magnitude and frequency. Other extreme risk algorithms can be used to the same effect. The mapping information is then used to identify the elements, factors, resources and/or actions that will be affected by each extreme risk. Every extreme risk bot activated in this block contains the information shown in Table 21.

TABLE 21
1. Unique ID number (based on date, hour, minute, second of creation)
2. Creation date (date, hour, minute, second)
3. Mapping information
4. Storage location
5. Hierarchy of Group
6. Entity
7. Method: blocks or peak over threshold
8. Event (fire, flood, earthquake, tornado, accident, defection, etc.)

After the extreme risk bots are initialized, they activate in accordance with the frequency specified by the user (40) in the system settings table (162). Once activated, they retrieve the required information, forecast extreme event risks and map the impacts to the different elements, factors, resources and/or actions. The extreme event risk information is stored in the event risk table (156) in the contextbase (50) before processing advances to a software block 248.

The software in block 248 checks the bot date table (163) and deactivates competitor risk bots with creation dates before the current system date. The software in block 248 then retrieves the information from the transaction layer table (142), the relationship layer table (144), the event risk table (156), the entity schema table (157) and the system settings table (162) as required to initialize competitor risk bots in accordance with the frequency specified by the user (40) in the system settings table (162). Bots are independent components of the application software that complete specific tasks. In the case of competitor risk bots, their primary task is to identify the probability of competitor actions and/or events that events that are associated with negative measure performance in the relationship layer table (144). The competitor risk bots use game theoretic real option models to forecast competitor risks. Other risk forecasting algorithms can be used to the same effect. The mapping information is then used to identify the elements, factors, resources and/or actions that will be affected by each customer risk. Every competitor risk bot activated in this block contains the information shown in Table 122

TABLE 22
1. Unique ID number (based on date, hour, minute, second of creation)
2. Creation date (date, hour, minute, second)
3. Mapping information
4. Storage location
5. Entity Type(s)
6. Entity
7. Competitor

After the competitor risk bots are initialized, they retrieve the required information and forecast the frequency and magnitude of competitor risks. The bots save the competitor risk information in the event risk table (156) in the contextbase (50) and processing advances to a block 250.

The software in block 250 retrieves data from the event risk table (156) and the entity schema table (157) before using a measures data window (704) to display a table showing the distribution of risk impacts by element, factor, resource and action. After the review of the table is complete, the software in block 250 prompts the manager (41) via the measures data window (704) to specify one or more measures for the subject entity. Measures are quantitative indications of subject entity behavior or performance. The primary types of behavior are production, destruction and maintenance. As discussed previously, the manager (41) is given the option of using pre-defined measures or creating new measures using terms defined in the entity schema table (157). The measures can combine performance and risk measures or the performance and risk measures can be kept separate. If more than one measure is defined for the subject entity, then the manager (41) is prompted to assign a weighting or relative priority to the different measures that have been defined. As system processing advances, the assigned priorities can be compared to the priorities that entity actions indicate are most important. The priorities used to guide analysis can be the stated priorities, the inferred priorities or some combination thereof. The gap between stated priorities and actual priorities is a congruence indicator that can be used in analyzing performance.

After the specification of measures and priorities has been completed, the values of each of the newly defined measures are calculated using historical data and forecast data. If forecast data is not available, then the Complete Context™ Forecast application (603) is used to supply the missing values. These values are then stored in the measure layer table (145) along with the measure definitions and priorities. When data storage is complete, processing advances to a software block 252.

The software in block 252 checks the bot date table (163) and deactivates forecast update bots with creation dates before the current system date. The software in block 252 then retrieves the information from the system settings table (162) and environment layer table (149) as required to initialize forecast bots in accordance with the frequency specified by the user (40) in the system settings table (162). Bots are independent components of the application software of the present invention that complete specific tasks. In the case of forecast update bots, their task is to compare the forecasts for context factors and with the information available from futures exchanges (including idea markets) and update the existing forecasts as required. This function is generally only required when the system is not run continuously. Every forecast update bot activated in this block contains the information shown in Table 23.

TABLE 23
1. Unique ID number (based on date, hour, minute, second of creation)
2. Creation date (date, hour, minute, second)
3. Mapping information
4. Storage location
5. Entity Type(s)
6. Entity
7. Context factor
8. Measure
9. Forecast time period

After the forecast update bots are initialized, they activate in accordance with the frequency specified by the user (40) in the system settings table (162). Once activated, they retrieve the required information and determine if any forecasts need to be updated to bring them in line with the market data. The bots save the updated forecasts in the environment layer table (149) by entity and processing advances to a software block 254.

The software in block 254 checks the bot date table (163) and deactivates scenario bots with creation dates before the current system date. The software in block 254 then retrieves the information from the system settings table (162), the element layer table (141), the transaction layer table (142), the resource layer table (143), the relationship layer table (144), the environment layer table (149), the event risk table (156) and the entity schema table (157) as required to initialize scenario bots in accordance with the frequency specified by the user (40) in the system settings table (162).

Bots are independent components of the application software of the present invention that complete specific tasks. In the case of scenario bots, their primary task is to identify likely scenarios for the evolution of the elements, factors, resources and event risks by entity. The scenario bots use the statistics calculated in block 218 together with the layer information retrieved from the contextbase (50) to develop forecasts for the evolution of the elements, factors, resources, events and actions under normal conditions, extreme conditions and a blended extreme-normal scenario. Every scenario bot activated in this block contains the information shown in Table 24.

TABLE 24
1. Unique ID number (based on date, hour, minute, second of creation)
2. Creation date (date, hour, minute, second)
3. Mapping information
4. Storage location
5. Type: normal, extreme or blended
6. Entity Type(s)
7. Entity
8. Measure

After the scenario bots are initialized, they activate in accordance with the frequency specified by the user (40) in the system settings table (162). Once activated, they retrieve the required information and develop a variety of scenarios as described previously. After the scenario bots complete their calculations, they save the resulting scenarios in the scenario table (168) by entity in the contextbase (50) and processing advances to a block 301.

The flow diagrams in FIG. 7A, FIG. 7B, FIG. 7C, FIG. 7D, FIG. 7E, FIG. 7F, FIG. 7G and FIG. 7H detail the processing that is completed by the portion of the application software (300) that continually develops a function measure oriented contextbase (50) by creating and activating analysis bots that:

Before discussing this stage of processing in more detail, it will be helpful to review the processing already completed. As discussed previously, we are interested developing knowledge regarding the behavior of a subject entity. We will develop this knowledge by developing a detailed understanding of the impact of elements, environmental factors, resources, reference position, events and actions on one or more subject entity function measures. Some of the elements and resources may have been grouped together to complete processes (a special class of element). The first stage of processing reviewed the data from some or all of the narrow systems (4) listed in Table 4, 5, 6 and 7 and the devices (3) listed in Table 8 and established a layered contextbase (50) that formalized the understanding of the identity and description of the elements, factors, resources, events and transactions that impact subject entity function measure performance. The layered contextbase (50) also ensures ready access to the required data for the second and third stages of computation in the entity centric computer system (100). In the second stage of processing we will use the contextbase (50) to develop an understanding of the relative impact of the different elements, factors, resources, events and transactions on subject entity measures.

Because processes rely on elements and resources to produce actions, the user (40) is given the choice between a process view and an element view for measure analysis to avoid double counting. If the user (40) chooses the element approach, then the process impact can be obtained by allocating element and resource impacts to the processes. Alternatively, if the user (40) chooses the process approach, then the process impacts can be divided by element and resource.

Processing in this portion of the application begins in software block 301. The software in block 301 checks the measure layer table (145) in the contextbase (50) to determine if there are current models for all measures for every entity. Measures that are integrated to combine the performance and risk measures into an overall measure are considered two measures for purposes of this evaluation. If all measure models are current, then processing advances to a software block 322. Alternatively, if all measure models are not current, then processing advances to a software block 303.

The software in block 303 retrieves the previously calculated values for the next measure from the measure layer table (145) before processing advances to a software block 304. The software in block 304 checks the bot date table (163) and deactivates temporal clustering bots with creation dates before the current system date. The software in block 304 then initializes bots in accordance with the frequency specified by the user (40) in the system settings table (162). The bots retrieve information from the measure layer table (145) for the entity being analyzed and defines regimes for the measure being analyzed before saving the resulting cluster information in the relationship layer table (144) in the contextbase (50). Bots are independent components of the application software of the present invention that complete specific tasks. In the case of temporal clustering bots, their primary task is to segment measure performance into distinct time regimes that share similar characteristics. The temporal clustering bot assigns a unique identification (id) number to each “regime” it identifies before tagging and storing the unique id numbers in the relationship layer table (144). Every time period with data are assigned to one of the regimes. The cluster id for each regime is associated with the measure and entity being analyzed. The time regimes are developed using a competitive regression algorithm that identifies an overall, global model before splitting the data and creating new models for the data in each partition. If the error from the two models is greater than the error from the global model, then there is only one regime in the data. Alternatively, if the two models produce lower error than the global model, then a third model is created. If the error from three models is lower than from two models then a fourth model is added. The processing continues until adding a new model does not improve accuracy. Other temporal clustering algorithms may be used to the same effect. Every temporal clustering bot contains the information shown in Table 25.

TABLE 25
1. Unique ID number (based on date, hour, minute, second of creation)
2. Creation date (date, hour, minute, second)
3. Mapping information
4. Storage location
5. Maximum number of clusters
6. Entity Type(s)
7. Entity
8. Measure

When bots in block 304 have identified and stored regime assignments for all time periods with measure data for the current entity, processing advances to a software block 305.

The software in block 305 checks the bot date table (163) and deactivates variable clustering bots with creation dates before the current system date. The software in block 305 then initializes bots as required for each element, resource and factor for the current entity. The bots activate in accordance with the frequency specified by the user (40) in the system settings table (162), retrieve the information from the element layer table (141), the transaction layer table (142), the resource layer table (143), the environment layer table (149) and the entity schema table (157) as required and define segments for element, resource and factor data before tagging and saving the resulting cluster information in the relationship layer table (144).

Bots are independent components of the application software of the present invention that complete specific tasks. In the case of variable clustering bots, their primary task is to segment the element, resource and factor data—including performance indicators—into distinct clusters that share similar characteristics. The clustering bot assigns a unique id number to each “cluster” it identifies, tags and stores the unique id numbers in the relationship layer table (144). Every item variable for each element, resource and factor is assigned to one of the unique clusters. The element data, resource data and factor data are segmented into a number of clusters less than or equal to the maximum specified by the user (40) in the system settings table (162). The data are segmented using several clustering algorithms including: an unsupervised “Kohonen” neural network, decision tree, support vector method, K-nearest neighbor, expectation maximization (EM) and the segmental K-means algorithm. For algorithms that normally require the number of clusters to be specified, the bot will use the maximum number of clusters specified by the user (40). Every variable clustering bot contains the information shown in Table 26.

TABLE 26
1. Unique ID number (based on date, hour, minute, second
of creation)
2. Creation date (date, hour, minute, second)
3. Mapping information
4. Storage location
5. Element, factor or resource
6. Clustering algorithm type
7. Entity Type(s)
8. Entity
9. Measure
10.  Maximum number of clusters
11.  Variable 1
. . . to
11 + n. Variable n

When bots in block 305 have identified, tagged and stored cluster assignments for the data associated with every element, resource and factor in the relationship layer table (144), processing advances to a software block 307.

The software in block 307 checks the measure layer table (145) in the contextbase (50) to see if the current measure is an options based measure like contingent liabilities, real options or competitor risk. If the current measure is not an options based measure, then processing advances to a software block 309. Alternatively, if the current measure is an options based measure, then processing advances to a software block 308.

The software in block 308 checks the bot date table (163) and deactivates option bots with creation dates before the current system date. The software in block 308 then retrieves the information from the system settings table (162), the entity schema table (157) and the element layer table (141), the transaction layer table (142), the resource layer table (143), the relationship layer table (144), the environment layer table (149) and the scenarios table (168) as required to initialize option bots in accordance with the frequency specified by the user (40) in the system settings table (162).

Bots are independent components of the application software of the present invention that complete specific tasks. In the case of option bots, their primary task is to determine the impact of each element, resource and factor on the entity option measure under different scenarios. The option simulation bots run a normal scenario, an extreme scenario and a combined scenario with and without clusters. In one embodiment, Monte Carlo models are used to complete the probabilistic simulation, however other option models including binomial models, multinomial models and dynamic programming can be used to the same effect. The element, resource and factor impacts on option measures could be determined using the processed detailed below for the other types of measures, however, in the embodiment being described herein a separate procedure is used. Every option bot activated in this block contains the information shown in Table 27.

TABLE 27
1. Unique ID number (based on date, hour, minute, second of creation)
2. Creation date (date, hour, minute, second)
3. Mapping information
4. Storage location
5. Scenario: normal, extreme or combined
6. Option type: real option, contingent liability or competitor risk
7. Entity Type(s)
8. Entity
9. Measure
10. Clustered data? (Yes or No)
11. Algorithm

After the option bots are initialized, they activate in accordance with the frequency specified by the user (40) in the system settings table (162). Once activated, the bots retrieve the required information and simulate the measure over the time periods specified by the user (40) in the system settings table (162) as required to determine the impact of each element, resource and factor on the option. After the option bots complete their calculations, the impacts and sensitivities for the option (clustered data—yes or no) that produced the best result under each scenario are saved in the measure layer table (145) in the contextbase (50) and processing returns to software block 301.

If the current measure was not an option measure, then processing advanced to software block 309. The software in block 309 checks the bot date table (163) and deactivates all predictive model bots with creation dates before the current system date. The software in block 309 then retrieves the information from the system settings table (162), the entity schema table (157) and the element layer table (141), the transaction layer table (142), the resource layer table (143), the relationship layer table (144) and the environment layer table (149) as required to initialize predictive model bots for each measure layer.

Bots are independent components of the application software that complete specific tasks. In the case of predictive model bots, their primary task is to determine the relationship between the indicators and the one or more measures being evaluated. Predictive model bots are initialized for each cluster and regime of data in accordance with the cluster and regime assignments specified by the bots in blocks 304 and 305. A series of predictive model bots is initialized at this stage because it is impossible to know in advance which predictive model type will produce the “best” predictive model for the data from each entity. The series for each model includes: neural network; CART; GARCH, projection pursuit regression; stepwise regression, logistic regression, probit regression, factor analysis, growth modeling, linear regression; redundant regression network; boosted Naive Bayes Regression; support vector method, markov models, kriging, multivalent models, relevance vector method, MARS, rough-set analysis and generalized additive model (GAM). Other types predictive models can be used to the same effect. Every predictive model bot contains the information shown in Table 28.

TABLE 28
1. Unique ID number (based on date, hour, minute, second of creation)
2. Creation date (date, hour, minute, second)
3. Mapping information
4. Storage location
5. Entity Type(s)
6. Entity
7. Measure
8. Type: Cluster (ID), Regime (ID), Cluster (ID) & Regime (ID)
9. Predictive model type

After predictive model bots are initialized, the bots activate in accordance with the frequency specified by the user (40) in the system settings table (162). Once activated, the bots retrieve the required data from the appropriate table in the contextbase (50) and randomly partition the element, resource or factor data into a training set and a test set. The software in block 309 uses “bootstrapping” where the different training data sets are created by re-sampling with replacement from the original training set so data records may occur more than once. Training with genetic algorithms can also be used. After the predictive model bots complete their training and testing, the best fit predictive model assessments of element, resource and factor impacts on measure performance are saved in the measure layer table (145) before processing advances to a block 310.

The software in block 310 determines if clustering improved the accuracy of the predictive models generated by the bots in software block 309 by entity. The software in block 310 uses a variable selection algorithm such as stepwise regression (other types of variable selection algorithms can be used) to combine the results from the predictive model bot analyses for each type of analysis—with and without clustering—to determine the best set of variables for each type of analysis. The type of analysis having the smallest amount of error as measured by applying the root mean squared error algorithm to the test data are given preference in determining the best set of variables for use in later analysis. Other error algorithms including entropy measures may also be used. There are four possible outcomes from this analysis as shown in Table 29.

TABLE 29
1. Best model has no clustering
2. Best model has temporal clustering, no variable clustering
3. Best model has variable clustering, no temporal clustering
4. Best model has temporal clustering and variable clustering

If the software in block 310 determines that clustering improves the accuracy of the predictive models for an entity, then processing advances to a software block 314. Alternatively, if clustering does not improve the overall accuracy of the predictive models for an entity, then processing advances to a software block 312.

The software in block 312 uses a variable selection algorithm such as stepwise regression (other types of variable selection algorithms can be used) to combine the results from the predictive model bot analyses for each model to determine the best set of variables for each model. The models having the smallest amount of error, as measured by applying the root mean squared error algorithm to the test data, are given preference in determining the best set of variables. Other error algorithms including entropy measures may also be used. As a result of this processing, the best set of variables contain the: variables (aka element, resource and factor data), indicators and composite variables that correlate most strongly with changes in the measure being analyzed. The best set of variables will hereinafter be referred to as the “performance drivers”.

Eliminating low correlation factors from the initial configuration of the vector creation algorithms increases the efficiency of the next stage of system processing. Other error algorithms including entropy measures may be substituted for the root mean squared error algorithm. After the best set of variables have been selected, tagged and stored in the relationship layer table (144) for each entity, the software in block 312 tests the independence of the performance drivers for each entity before processing advances to a block 313.

The software in block 313 checks the bot date table (163) and deactivates causal predictive model bots with creation dates before the current system date. The software in block 313 then retrieves the information from the system settings table (162), the entity schema table (157) and the element layer table (141), the transaction layer table (142), the resource layer table (143), the relationship layer table (144) and the environment layer table (149) as required to initialize causal predictive model bots for each element, resource and factor in accordance with the frequency specified by the user (40) in the system settings table (162). Sub-context elements, resources and factors may be used in the same manner.

Bots are independent components of the application software that complete specific tasks. In the case of causal predictive model bots, their primary task is to refine the performance driver selection to reflect only causal variables. A series of causal predictive model bots are initialized at this stage because it is impossible to know in advance which causal predictive model will produce the “best” vector for the best fit variables from each model. The series for each model includes six causal predictive model bot types: Tetrad, MML, LaGrange, Bayesian, Probabilistic Relational Model (if allowed) and path analysis. The Bayesian bots in this step also refine the estimates of element, resource and/or factor impact developed by the predictive model bots in a prior processing step by assigning a probability to the impact estimate. The software in block 313 generates this series of causal predictive model bots for each set of performance drivers stored in the relationship layer table (144) in the previous stage in processing. Every causal predictive model bot activated in this block contains the information shown in Table 30.

TABLE 30
1. Unique ID number (based on date, hour, minute, second of creation)
2. Creation date (date, hour, minute, second)
3. Mapping information
4. Storage location
5. Causal predictive model type
6. Entity Type(s)
7. Entity
8. Measure

After the causal predictive model bots are initialized by the software in block 313, the bots activate in accordance with the frequency specified by the user (40) in the system settings table (162). Once activated, they retrieve the required information for each model and sub-divide the variables into two sets, one for training and one for testing. After the causal predictive model bots complete their processing for each model, the software in block 313 uses a model selection algorithm to identify the model that best fits the data. For the system of the present invention, a cross validation algorithm is used for model selection. The software in block 313 then saves the refined impact estimates in the measure layer table (145) and the best fit causal element, resource and/or factor indicators are identified in the relationship layer table (144) in the contextbase (50) before processing returns to software block 301.

If software in block 310 determines that clustering improves predictive model accuracy, then processing advances directly to block 314 as described previously. The software in block 314 uses a variable selection algorithm such as stepwise regression (other types of variable selection algorithms can be used) to combine the results from the predictive model bot analyses for each model, cluster and/or regime to determine the best set of variables for each model. The models having the smallest amount of error as measured by applying the root mean squared error algorithm to the test data are given preference in determining the best set of variables. Other error algorithms including entropy measures may also be used. As a result of this processing, the best set of variables contains: the element data and factor data that correlate most strongly with changes in the function measure. The best set of variables will hereinafter be referred to as the “performance drivers”. Eliminating low correlation factors from the initial configuration increases the efficiency of the next stage of system processing. Other error algorithms including entropy measures may be substituted for the root mean squared error algorithm. After the best set of variables have been selected, they are tagged as performance drivers and stored in the relationship layer table (144), the software in block 314 tests the independence of the performance drivers before processing advances to a block 315.

The software in block 315 checks the bot date table (163) and deactivates causal predictive model bots with creation dates before the current system date. The software in block 315 then retrieves the information from the system settings table (162), the entity schema table (157) and the element layer table (141), the transaction layer table (142), the resource layer table (143), the relationship layer table (144) and the environment layer table (149) as required to initialize causal predictive model bots in accordance with the frequency specified by the user (40) in the system settings table (162). Bots are independent components of the application software of the present invention that complete specific tasks. In the case of causal predictive model bots, their primary task is to refine the element, resource and factor performance driver selection to reflect only causal variables. (Note: these variables are grouped together to represent a single element vector when they are dependent). In some cases it may be possible to skip the correlation step before selecting causal item variables, factor variables, indicators, and composite variables. A series of causal predictive model bots are initialized at this stage because it is impossible to know in advance which causal predictive model will produce the “best” vector for the best fit variables from each model. The series for each model includes: Tetrad, LaGrange, Bayesian, Probabilistic Relational Model and path analysis. The Bayesian bots in this step also refine the estimates of element or factor impact developed by the predictive model bots in a prior processing step by assigning a probability to the impact estimate. The software in block 315 generates this series of causal predictive model bots for each set of performance drivers stored in the entity schema table (157) in the previous stage in processing. Every causal predictive model bot activated in this block contains the information shown in Table 31.

TABLE 31
1. Unique ID number (based on date, hour, minute, second of creation)
2. Creation date (date, hour, minute, second)
3. Mapping information
4. Storage location
5. Type: Cluster (ID), Regime (ID), Cluster (ID) & Regime (ID)
5. Entity Type(s)
6. Entity
7. Measure
8. Causal predictive model type

After the causal predictive model bots are initialized by the software in block 315, the bots activate in accordance with the frequency specified by the user (40) in the system settings table (162). Once activated, they retrieve the required information for each model and sub-divide the variables into two sets, one for training and one for testing. The same set of training data are used by each of the different types of bots for each model. After the causal predictive model bots complete their processing for each model, the software in block 315 uses a model selection algorithm to identify the model that best fits the data for each element, resource and factor being analyzed by model and/or regime by entity. For the system of the present invention, a cross validation algorithm is used for model selection. The software in block 315 saves the refined impact estimates in the measure layer table (145) and identifies the best fit causal element, resource and/or factor indicators in the relationship layer table (144) in the contextbase (50) before processing returns to software block 301.

When the software in block 301 determines that all measure models are current, then processing advances to a software block 322. The software in block 322 checks the measure layer table (145) and the event model table (158) in the contextbase (50) to determine if all event models are current. If all event models are current, then processing advances to a software block 332. Alternatively, if new event models need to be developed, then processing advances to a software block 325. The software in block 325 retrieves information from the system settings table (162), the entity schema table (157) and the element layer table (141), the transaction layer table (142), the resource layer table (143), the relationship layer table (144), the environment layer table (149) and the event model table (158) as required to complete summaries of event history and forecasts before processing advances to a software block 304 where the processing sequence described above (save for the option bot processing)—is used to identify drivers for event frequency. After all event frequency models have been developed they are stored in the event model table (158), processing advances to a software block 332.

The software in block 332 checks the measure layer table (145) and impact model table (166) in the contextbase (50) to determine if impact models are current for all event risks and transactions. If all impact models are current, then processing advances to a software block 341. Alternatively, if new impact models need to be developed, then processing advances to a software block 335. The software in block 335 retrieves information from the system settings table (162), the entity schema table (157) and the element layer table (141), the transaction layer table (142), the resource layer table (143), the relationship layer table (144), the environment layer table (149) and the impact model table (166) as required to complete summaries of impact history and forecasts before processing advances to a software block 304 where the processing sequence described above—save for the option bot processing—is used to identify drivers for event and action impact (or magnitude). After impact models have been developed for all event risks and transaction impacts they are stored in the impact model table (166) and processing advances to a software block 341.

If a spatial coordinate system is being used, then processing advances to a block 341 before processing begins. The software in block 341 checks the measure layer table (145) in the contextbase (50) to determine if there are current models for all measures for every entity level. If all measure models are current, then processing advances to a software block 350. Alternatively, if all measure models are not current, then processing advances to a software block 303. The software in block 303 retrieves the previously calculated values for the measure from the measure layer table (145) before processing advances to software block 304.

The software in block 304 checks the bot date table (163) and deactivates temporal clustering bots with creation dates before the current system date. The software in block 304 then initializes bots in accordance with the frequency specified by the user (40) in the system settings table (162). The bots retrieve information from the measure layer table (145) for the entity being analyzed and defines regimes for the measure being analyzed before saving the resulting cluster information in the relationship layer table (144) in the contextbase (50). Bots are independent components of the application software of the present invention that complete specific tasks. In the case of temporal clustering bots, their primary task is to segment measure performance into distinct time regimes that share similar characteristics. The temporal clustering bot assigns a unique identification (id) number to each “regime” it identifies before tagging and storing the unique id numbers in the relationship layer table (144). Every time period with data are assigned to one of the regimes. The cluster id for each regime is associated with the measure and entity being analyzed. The time regimes are developed using a competitive regression algorithm that identifies an overall, global model before splitting the data and creating new models for the data in each partition. If the error from the two models is greater than the error from the global model, then there is only one regime in the data. Alternatively, if the two models produce lower error than the global model, then a third model is created. If the error from three models is lower than from two models then a fourth model is added. The processing continues until adding a new model does not improve accuracy. Other temporal clustering algorithms may be used to the same effect. Every temporal clustering bot contains the information shown in Table 32.

TABLE 32
1. Unique ID number (based on date, hour, minute, second of creation)
2. Creation date (date, hour, minute, second)
3. Mapping information
4. Storage location
5. Maximum number of clusters
6. Entity Type(s)
7. Entity
8. Measure

When bots in block 304 have identified and stored regime assignments for all time periods with measure data for the current entity, processing advances to a software block 305.

The software in block 305 checks the bot date table (163) and deactivates variable clustering bots with creation dates before the current system date. The software in block 305 then initializes bots as required for each context element, resource and factor for the current entity level. The bots activate in accordance with the frequency specified by the user (40) in the system settings table (162), retrieve the information from the element layer table (141), the transaction layer table (142), the resource layer table (143), the environment layer table (149) and the entity schema table (157) as required and define segments for context element, resource and factor data before tagging and saving the resulting cluster information in the relationship layer table (144). Bots are independent components of the application software of the present invention that complete specific tasks. In the case of variable clustering bots, their primary task is to segment the element, resource and factor data—including indicators—into distinct clusters that share similar characteristics. The clustering bot assigns a unique id number to each “cluster” it identifies, tags and stores the unique id numbers in the relationship layer table (144). Every variable for every context element, resource and factor is assigned to one of the unique clusters. The element data, resource data and factor data are segmented into a number of clusters less than or equal to the maximum specified by the user (40) in the system settings table (162). The data are segmented using several clustering algorithms including: an unsupervised “Kohonen” neural network, decision tree, support vector method, K-nearest neighbor, expectation maximization (EM) and the segmental K-means algorithm. For algorithms that normally require the number of clusters to be specified, the bot will use the maximum number of clusters specified by the user (40). Every variable clustering bot contains the information shown in Table 33.

TABLE 33
1. Unique ID number (based on date, hour, minute, second of
creation)
2. Creation date (date, hour, minute, second)
3. Mapping information
4. Storage location
5. Context element, resource or factor
6. Clustering algorithm
7. Entity Type(s)
8. Entity
9. Measure
10.  Maximum number of clusters
11.  Variable 1
. . . to
11 + n. Variable n

When bots in block 305 have identified, tagged and stored cluster assignments for the data associated with every element, resource and factor in the relationship layer table (144), processing advances to a software block 343.

The software in block 343 checks the bot date table (163) and deactivates spatial clustering bots with creation dates before the current system date. The software in block 343 then retrieves the information from the system settings table (162), the entity schema table (157) and the element layer table (141), the transaction layer table (142), the resource layer table (143), the relationship layer table (144), the environment layer table (149), the spatial reference layer (154) and the scenarios table (168) as required to initialize spatial clustering bots in accordance with the frequency specified by the user (40) in the system settings table (162). Bots are independent components of the application software that complete specific tasks. In the case of spatial clustering bots, their primary task is to segment the element, resource and factor data—including performance indicators—into distinct clusters that share similar characteristics. The clustering bot assigns a unique id number to each “cluster” it identifies, tags and stores the unique id numbers in the relationship layer table (144). Data for each context element, resource and factor is assigned to one of the unique clusters. The element, resource and factor data are segmented into a number of clusters less than or equal to the maximum specified by the user (40) in the system settings table (162). The system of the present invention uses several spatial clustering algorithms including: hierarchical clustering, cluster detection, k-ary clustering, variance to mean ratio, lacunarity analysis, pair correlation, join correlation, mark correlation, fractal dimension, wavelet, nearest neighbor, local index of spatial association (LISA), spatial analysis by distance indices (SADIE), mantel test and circumcircle. Every spatial clustering bot activated in this block contains the information shown in Table 34.

TABLE 34
1. Unique ID number (based on date, hour, minute, second of
creation)
2. Creation date (date, hour, minute, second)
3. Mapping information
4. Storage location
5. Element, resource or factor
6. Clustering algorithm
7. Entity Type(s)
8. Entity
9. Measure
10.  Maximum number of clusters
11.  Variable 1
. . . to
11 + n. Variable n

When bots in block 343 have identified, tagged and stored cluster assignments for the data associated with every element, resource and factor in the relationship layer table (144), processing advances to a software block 307.

The software in block 307 checks the measure layer table (145) in the contextbase (50) to see if the current measure is an options based measure like contingent liabilities, real options or competitor risk. If the current measure is not an options based measure, then processing advances to a software block 309. Alternatively, if the current measure is an options based measure, then processing advances to a software block 308.

The software in block 308 checks the bot date table (163) and deactivates option bots with creation dates before the current system date. The software in block 308 then retrieves the information from the system settings table (162), the entity schema table (157) and the element layer table (141), the transaction layer table (142), the resource layer table (143), the relationship layer table (144), the environment layer table (149), the spatial reference layer (154) and the scenarios table (168) as required to initialize option bots in accordance with the frequency specified by the user (40) in the system settings table (162).

bots are independent components of the application software of the present invention that complete specific tasks. In the case of option bots, their primary task is to determine the impact of each element, resource and factor on the entity option measure under different scenarios. The option simulation bots run a normal scenario, an extreme scenario and a combined scenario with and without clusters. In one embodiment, Monte Carlo models are used to complete the probabilistic simulation, however other option models including binomial models, multinomial models and dynamic programming can be used to the same effect. The element, resource and factor impacts on option measures could be determined using the processed detailed below for the other types of measures, however, in this embodiment a separate procedure is used. The models are initialized with specifications used in the baseline calculations. Every option bot activated in this block contains the information shown in Table 35.

TABLE 35
1. Unique ID number (based on date, hour, minute, second of creation)
2. Creation date (date, hour, minute, second)
3. Mapping information
4. Storage location
5. Scenario: normal, extreme or combined
6. Option type: real option, contingent liability or competitor risk
7. Entity Type(s)
8. Entity
9. Measure
10. Clustered data? (Yes or No)
11. Algorithm

After the option bots are initialized, they activate in accordance with the frequency specified by the user (40) in the system settings table (162). Once activated, the bots retrieve the required information and simulate the measure over the time periods specified by the user (40) in the system settings table (162) as required to determine the impact of each element, resource and factor on the option. After the option bots complete their calculations, the impacts and sensitivities for the option (clustered data—yes or no) that produced the best result under each scenario are saved in the measure layer table (145) in the contextbase (50) and processing returns to software block 341.

If the current measure was not an option measure, then processing advanced to software block 309. The software in block 309 checks the bot date table (163) and deactivates all predictive model bots with creation dates before the current system date. The software in block 309 then retrieves the information from the system settings table (162), the entity schema table (157) and the element layer table (141), the transaction layer table (142), the resource layer table (143), the relationship layer table (144), the environment layer table (149) and the spatial reference layer (154) as required to initialize predictive model bots for the measure being evaluated.

Bots are independent components of the application software that complete specific tasks. In the case of predictive model bots, their primary task is to determine the relationship between the indicators and the measure being evaluated. Predictive model bots are initialized for each cluster of data in accordance with the cluster and regime assignments specified by the bots in blocks 304, 305 and 343. A series of predictive model bots is initialized at this stage because it is impossible to know in advance which predictive model type will produce the “best” predictive model for the data from each entity. The series for each model includes: neural network; CART; GARCH, projection pursuit regression; stepwise regression, logistic regression, probit regression, factor analysis, growth modeling, linear regression; redundant regression network; boosted naive bayes regression; support vector method, markov models, rough-set analysis, kriging, simulated annealing, latent class models, gaussian mixture models, triangulated probability and kernel estimation. Each model includes spatial autocorrelation indicators as performance indicators. Other types predictive models can be used to the same effect. Every predictive model bot contains the information shown in Table 36.

TABLE 36
1. Unique ID number (based on date, hour, minute, second of creation)
2. Creation date (date, hour, minute, second)
3. Mapping information
4. Storage location
5. Entity Type(s)
6. Entity
7. Measure
8. Type: variable (y or n), spatial (y or n), spatial-temporal (y or n)
9. Predictive model type

After predictive model bots are initialized, the bots activate in accordance with the frequency specified by the user (40) in the system settings table (162). Once activated, the bots retrieve the required data from the appropriate table in the contextbase (50) and randomly partition the element, resource and/or factor data into a training set and a test set. The software in block 309 uses “bootstrapping” where the different training data sets are created by re-sampling with replacement from the original training set so data records may occur more than once. Training with genetic algorithms can also be used. After the predictive model bots complete their training and testing, the best fit predictive model assessments of element, resource and factor impacts on measure performance are saved in the measure layer table (145) before processing advances to a block 345.

The software in block 345 determines if clustering improved the accuracy of the predictive models generated by the bots in software block 344. The software in block 345 uses a variable selection algorithm such as stepwise regression (other types of variable selection algorithms can be used) to combine the results from the predictive model bot analyses for each type of analysis—with and without clustering—to determine the best set of variables for each type of analysis. The type of analysis having the smallest amount of error as measured by applying the root mean squared error algorithm to the test data are given preference in determining the best set of variables for use in later analysis. Other error algorithms including entropy measures may also be used. There are eight possible outcomes from this analysis as shown in Table 37.

TABLE 37
1. Best model has no clustering
2. Best model has temporal clustering, no variable clustering,
no spatial clustering
3. Best model has variable clustering, no temporal clustering,
no spatial clustering
4. Best model has temporal clustering, variable clustering,
no spatial clustering
5. Best model has no temporal clustering, no variable clustering,
spatial clustering
6. Best model has temporal clustering, no variable clustering,
spatial clustering
7. Best model has variable clustering, no temporal clustering,
spatial clustering
8. Best model has temporal clustering, variable clustering,
spatial clustering

If the software in block 345 determines that clustering improves the accuracy of the predictive models for an entity, then processing advances to a software block 348. Alternatively, if clustering does not improve the overall accuracy of the predictive models for an entity, then processing advances to a software block 346.

The software in block 346 uses a variable selection algorithm such as stepwise regression (other types of variable selection algorithms can be used) to combine the results from the predictive model bot analyses for each model to determine the best set of variables for each model. The models having the smallest amount of error, as measured by applying the root mean squared error algorithm to the test data, are given preference in determining the best set of variables. Other error algorithms including entropy measures may also be used. As a result of this processing, the best set of variables contain the: variables (aka element, resource and factor data), indicators, and composite variables that correlate most strongly with changes in the measure being analyzed. The best set of variables will hereinafter be referred to as the “performance drivers”.

Eliminating low correlation factors from the initial configuration of the vector creation algorithms increases the efficiency of the next stage of system processing. Other error algorithms including entropy measures may be substituted for the root mean squared error algorithm. After the best set of variables have been selected, tagged and stored in the relationship layer table (144) for each entity level, the software in block 346 tests the independence of the performance drivers for each entity level before processing advances to a block 347.

The software in block 347 checks the bot date table (163) and deactivates causal predictive model bots with creation dates before the current system date. The software in block 347 then retrieves the information from the system settings table (162), the entity schema table (157) and the element layer table (141), the transaction layer table (142), the resource layer table (143), the relationship layer table (144) and the environment layer table (149) as required to initialize causal predictive model bots for each element, resource and factor in accordance with the frequency specified by the user (40) in the system settings table (162). Sub-context elements, resources and factors may be used in the same manner.

Bots are independent components of the application software that complete specific tasks. In the case of causal predictive model bots, their primary task is to refine the performance driver selection to reflect only causal variables. A series of causal predictive model bots are initialized at this stage because it is impossible to know in advance which causal predictive model will produce the “best” fit for variables from each model. The series for each model includes six causal predictive model bot types: kriging, latent class models, gaussian mixture models, kernel estimation and Markov-Bayes. The software in block 347 generates this series of causal predictive model bots for each set of performance drivers stored in the relationship layer table (144) in the previous stage in processing. Every causal predictive model bot activated in this block contains the information shown in Table 38.

TABLE 38
1. Unique ID number (based on date, hour, minute, second of creation)
2. Creation date (date, hour, minute, second)
3. Mapping information
4. Storage location
5. Causal predictive model type
6. Entity Type(s)
7. Entity
8. Measure

After the causal predictive model bots are initialized by the software in block 347, the bots activate in accordance with the frequency specified by the user (40) in the system settings table (162). Once activated, they retrieve the required information for each model and sub-divide the variables into two sets, one for training and one for testing. After the causal predictive model bots complete their processing for each model, the software in block 347 uses a model selection algorithm to identify the model that best fits the data. For the system of the present invention, a cross validation algorithm is used for model selection. The software in block 347 then saves the refined impact estimates in the measure layer table (145) and the best fit causal element, resource and/or factor indicators are identified in the relationship layer table (144) in the contextbase (50) before processing returns to software block 301.

If software in block 345 determines that clustering improves predictive model accuracy, then processing advances directly to block 348 as described previously. The software in block 348 uses a variable selection algorithm such as stepwise regression (other types of variable selection algorithms can be used) to combine the results from the predictive model bot analyses for each model, cluster and/or regime to determine the best set of variables for each model. The models having the smallest amount of error as measured by applying the root mean squared error algorithm to the test data are given preference in determining the best set of variables. Other error algorithms including entropy measures can also be used. As a result of this processing, the best set of variables contains: the element data, resource data and factor data that correlate most strongly with changes in the function measures. The best set of variables will hereinafter be referred to as the “performance drivers”. Eliminating low correlation factors from the initial configuration of the vector creation algorithms increases the efficiency of the next stage of system processing. Other error algorithms including entropy measures may be substituted for the root mean squared error algorithm. After the best set of variables have been selected, they are tagged as performance drivers and stored in the relationship layer table (144), the software in block 348 tests the independence of the performance drivers before processing advances to a block 349.

The software in block 349 checks the bot date table (163) and deactivates causal predictive model bots with creation dates before the current system date. The software in block 349 then retrieves the information from the system settings table (162), the entity schema table (157) and the element layer table (141), the transaction layer table (142), the resource layer table (143), the relationship layer table (144) and the environment layer table (149) as required to initialize causal predictive model bots in accordance with the frequency specified by the user (40) in the system settings table (162). bots are independent components of the application software of the present invention that complete specific tasks. In the case of causal predictive model bots, their primary task is to refine the element, resource and factor performance driver selection to reflect only causal variables. (Note: these variables are grouped together to represent a single vector when they are dependent). In some cases it may be possible to skip the correlation step before selecting causal the item variables, factor variables, indicators and composite variables. A series of causal predictive model bots are initialized at this stage because it is impossible to know in advance which causal predictive model will produce the “best” fit variables for each measure. The series for each measure includes six causal predictive model bot types: kriging, latent class models, gaussian mixture models, kernel estimation and Markov-Bayes. The software in block 349 generates this series of causal predictive model bots for each set of performance drivers stored in the entity schema table (157) in the previous stage in processing. Every causal predictive model bot activated in this block contains the information shown in Table 39.

TABLE 39
1. Unique ID number (based on date, hour, minute, second of creation)
2. Creation date (date, hour, minute, second)
3. Mapping information
4. Storage location
5. Type: Cluster (ID), Regime (ID), Cluster (ID) & Regime (ID)
6. Entity Type(s)
7. Entity
8. Measure
9. Causal predictive model type

After the causal predictive model bots are initialized by the software in block 349, the bots activate in accordance with the frequency specified by the user (40) in the system settings table (162). Once activated, they retrieve the required information for each model and sub-divide the variables into two sets, one for training and one for testing. The same set of training data are used by each of the different types of bots for each model. After the causal predictive model bots complete their processing for each model, the software in block 349 uses a model selection algorithm to identify the model that best fits the data for each process, element, resource and/or factor being analyzed by model and/or regime by entity. For the system of the present invention, a cross validation algorithm is used for model selection. The software in block 349 saves the refined impact estimates in the measure layer table (145) and identifies the best fit causal element, resource and/or factor indicators in the relationship layer table (144) in the contextbase (50) before processing returns to software block 341.

When the software in block 341 determines that all measure models are current processing advances to a software block 351. The software in block 351 checks the measure layer table (145) and the event model table (158) in the contextbase (50) to determine if all event models are current. If all event models are current, then processing advances to a software block 361. Alternatively, if new event models need to be developed, then processing advances to a software block 325. The software in block 325 retrieves information from the system settings table (162), the entity schema table (157) and the element layer table (141), the transaction layer table (142), the resource layer table (143), the relationship layer table (144), the environment layer table (149), the spatial reference table (154) and the event model table (158) as required to complete summaries of event history and forecasts before processing advances to a software block 304 where the processing sequence described above—save for the option bot processing—is used to identify drivers for event risk and transaction frequency. After all event frequency models have been developed they are stored in the event model table (158) and processing advances to software block 361.

The software in block 361 checks the measure layer table (145) and impact model table (166) in the contextbase (50) to determine if impact models are current for all event risks and actions. If all impact models are current, then processing advances to a software block 370. Alternatively, if new impact models need to be developed, then processing advances to a software block 335. The software in block 335 retrieves information from the system settings table (162), the entity schema table (157) and the element layer table (141), the transaction layer table (142), the resource layer table (143), the relationship layer table (144), the environment layer table (149)), the spatial reference table (154) and the impact model table (166) as required to complete summaries of impact history and forecasts before processing advances to a software block 304 where the processing sequence described above—save for the option bot processing—is used to identify drivers for event risk and transaction impact (or magnitude). After impact models have been developed for all event risks and action impacts they are stored in the impact model table (166) and processing advances to software block 370.

The software in block 370 determines if adding spatial data improves the accuracy of the predictive models. The software in block 370 uses a variable selection algorithm such as stepwise regression (other types of variable selection algorithms can be used) to combine the results from each type of prior analysis—with and without spatial data—to determine the best set of variables for each type of analysis. The type of analysis having the smallest amount of error as measured by applying the root mean squared error algorithm to the test data are used for subsequent later analysis. Other error algorithms including entropy measures may also be used. There are eight possible outcomes from this analysis as shown in Table 40.

TABLE 40
1. Best measure, event and impact models are spatial
2. Best measure and event models are spatial, best impact model is
not spatial
3. Best measure and impact models are spatial, best event model is
not spatial
5. Best measure models are spatial, best event and impact models are
not spatial
5. Best measure models are not spatial, best event and impact models
are spatial
6. Best measure and impact models are not spatial, best event model
is spatial
7. Best measure and event models are not spatial, best impact model
is spatial
8. Best measure, event and impact models are not spatial

The best set of models identified by the software in block 370 are tagged for use in subsequent processing before processing advances to a software block 371.

The software in block 371 checks the measure layer table (145) in the contextbase (50) to determine if probabilistic relational models were used in measure impacts. If probabilistic relational models were used, then processing advances to a software block 377. Alternatively, if probabilistic relational models were not used, then processing advances to a software block 372.

The software in block 372 tests the performance drivers to see if there is interaction between elements, factors and/or resources by entity. The software in this block identifies interaction by evaluating a chosen model based on stochastic-driven pairs of value-driver subsets. If the accuracy of such a model is higher that the accuracy of statistically combined models trained on attribute subsets, then the attributes from subsets are considered to be interacting and then they form an interacting set. Other tests of driver interaction can be used to the same effect. The software in block 372 also tests the performance drivers to see if there are “missing” performance drivers that are influencing the results. If the software in block 372 does not detect any performance driver interaction or missing variables for each entity, then system processing advances to a block 376. Alternatively, if missing data or performance driver interactions across elements, factors and/resources are detected by the software in block 372 for one or more measure processing advances to a software block 373.

The software in block 373 evaluates the interaction between performance drivers as required to classify the performance driver set. The performance driver set generally matches one of the six patterns of interaction: a multi-component loop, a feed forward loop, a single input driver, a multi input driver , auto-regulation and a chain. After classifying each performance driver set the software in block 373 prompts the user (40) via the structure revision window (706) to accept the classification and continue processing, establish probabilistic relational models as the primary causal model and/or adjust the specification(s) for the context elements and factors in some other way as required to minimize or eliminate interaction that was identified. For example, the user (40) can also choose to re-assign a performance driver to a new context element or factor to eliminate an identified inter-dependency. After the optional input from the user (40) is saved in the element layer table (141), the environment layer table (149) and the system settings table (162) processing advances to a software block 374. The software in block 374 checks the element layer table (141), the environment layer table (149) and system settings table (162) to see if there any changes in structure. If there have been changes in the structure, then processing returns to block 201 and the system processing described previously is repeated. Alternatively, if there are no changes in structure, then the information regarding the element interaction is saved in the relationship layer table (144) before processing advances to a block 376.

The software in block 376 checks the bot date table (163) and deactivates vector generation bots with creation dates before the current system date. The software in block 376 then initializes vector generation bots for each context element, sub-context element, element combination, factor combination, context factor and sub-context factor. The bots activate in accordance with the frequency specified by the user (40) in the system settings table (162) and retrieve information from the element layer table (141), the transaction layer table (142), the resource layer table (143), the relationship layer table (144) and the environment layer table (149). Bots are independent components of the application software that complete specific tasks. In the case of vector generation bots, their primary task is to produce vectors that summarize the relationship between the causal performance drivers and changes in the measure being examined. The vector generation bots use induction algorithms to generate the vectors. Other vector generation algorithms can be used to the same effect. Every vector generation bot contains the information shown in Table 41.

TABLE 41
1. Unique ID number (based on date, hour, minute, second of
creation)
2. Creation date (date, hour, minute, second)
3. Mapping information
4. Storage location
5. Hierarchy of Group
6. Entity
7. Measure
8. Element, sub-element, factor, sub-factor, resource,
sub-resource or combination
9. Factor 1
. . . to
9 + n. Factor n

When bots in block 376 have created and stored vectors for all time periods with data for all the elements, sub-elements, factors, sub-factors, resources, sub-resources and combinations that have vectors in the entity schema table (157) by entity, processing advances to a software block 377.

The software in block 377 checks the bot date table (163) and deactivates life bots with creation dates before the current system date. The software in block 377 then retrieves the information from the system settings table (162), the element layer table (141), the transaction layer table (142), the resource layer table (143), the relationship layer table (144) and the environment layer table (149) as required to initialize life bots for each element and factor. Bots are independent components of the application software that complete specific tasks. In the case of life bots, their primary task is to determine the expected life of each element, resource and factor. There are three methods for evaluating the expected life:

Every element life bot contains the information shown in Table 42.

TABLE 42
1. Unique ID number (based on date, hour, minute, second of creation)
2. Creation date (date, hour, minute, second)
3. Mapping information
4. Storage location
5. Hierarchy of Group
6. Entity
7. Measure
8. Element, sub-element, factor, sub-factor, resource,
sub-resource or combination
9. Life estimation method (item analysis, defined or forecast period)

After the life bots are initialized, they are activated in accordance with the frequency specified by the user (40) in the system settings table (162). After being activated, the bots retrieve information for each element and sub-context element from the contextbase (50) as required to complete the estimate of element life. The resulting values are then tagged and stored in the element layer table (141), the resource layer table (143) or the environment layer table (149) in the contextbase (50) before processing advances to a block 379.

The software in block 379 checks the bot date table (163) and deactivates dynamic relationship bots with creation dates before the current system date. The software in block 379 then retrieves the information from the system settings table (162), the element layer table (141), the transaction layer table (142), the resource layer table (143), the relationship layer table (144), the environment layer table (149) and the event risk table (156) as required to initialize dynamic relationship bots for the measure bots are independent components of the application software that complete specific tasks. In the case of dynamic relationship bots, their primary task is to identify the best fit dynamic model of the interrelationship between the different elements, factors, resources and events that are driving measure performance. The best fit model is selected from a group of potential linear models and non-linear models including swarm models, complexity models, simple regression models, power law models and fractal models. Every dynamic relationship bot contains the information shown in Table 43.

TABLE 43
1. Unique ID number (based on date, hour, minute, second of creation)
2. Creation date (date, hour, minute, second)
3. Mapping information
4. Storage location
5. Hierarchy of Group
6. Entity
7. Measure
8. Algorithm

The bots in block 379 identify the best fit model of the dynamic interrelationship between the elements, factors, resources and risks for the reviewed measure and store information regarding the best fit model in the relationship layer table (144) before processing advances to a software block 380.

The software in block 380 checks the bot date table (163) and deactivates partition bots with creation dates before the current system date. The software in the block then retrieves the information from the system settings table (162), the element layer table (141), the transaction layer table (142), the resource layer table (143), the relationship layer table (144), the measure layer table (145), the environment layer table (149), the event risk table (156) and the scenario table (168) to initialize partition bots in accordance with the frequency specified by the user (40) in the system settings table (162). bots are independent components of the application software of the present invention that complete specific tasks. In the case of partition bots, their primary task is to use the historical and forecast data to segment the performance measure contribution of each element, factor, resource, combination and performance driver into a base value and a variability or risk component. The system of the present invention uses wavelet algorithms to segment the performance contribution into two components although other segmentation algorithms such as GARCH could be used to the same effect. Every partition bot contains the information shown in Table 44.

TABLE 44
1. Unique ID number (based on date, hour, minute, second of creation)
2. Creation date (date, hour, minute, second)
3. Mapping information
4. Storage location
5. Hierarchy of Group
6. Entity
7. Measure
8. Element, factor, resource or combination
9. Segmentation algorithm

After the partition bots are initialized, the bots activate in accordance with the frequency specified by the user (40) in the system settings table (162). After being activated the bots retrieve data from the contextbase (50) and then segment the performance contribution of each element, factor, resource or combination into two segments. The resulting values by period for each entity are then stored in the measure layer table (145), before processing advances to a software block 382.

The software in block 382 retrieves the information from the event table (158) and the impact table (166) and combines the information from both tables as required to update the event risk estimate for the entity. The resulting values by period for each entity are then stored in the event risk table (156), before processing advances to a software block 389.

The software in block 389 checks the bot date table (163) and deactivates simulation bots with creation dates before the current system date. The software in block 389 then retrieves the information from the relationship layer table (144), the measure layer table (145), the event risk table (156), the entity schema table (157), the system settings table (162) and the scenario table (168) as required to initialize simulation bots in accordance with the frequency specified by the user (40) in the system settings table (162).

Bots are independent components of the application software that complete specific tasks. In the case of simulation bots, their primary task is to run three different types of simulations of entity measure performance. The simulation bots run probabilistic simulations of measure performance using: the normal scenario, the extreme scenario and the blended scenario. They also run an unconstrained genetic algorithm simulation that evolves to the most negative value possible over the specified time period. In one embodiment, Monte Carlo models are used to complete the probabilistic simulation, however other probabilistic simulation models such as Quasi Monte Carlo, genetic algorithm and Markov Chain Monte Carlo can be used to the same effect. The models are initialized using the statistics and relationships derived from the calculations completed in the prior stages of processing to relate measure performance to the performance driver, element, factor, resource and event risk scenarios. Every simulation bot activated in this block contains the information shown in Table 46.

TABLE 46
1. Unique ID number (based on date, hour, minute, second of creation)
2. Creation date (date, hour, minute, second)
3. Mapping information
4. Storage location
5. Type: normal, extreme, blended or genetic algorithm
6. Measure
7. Hierarchy of Group
8. Entity

After the simulation bots are initialized, they activate in accordance with the frequency specified by the user (40) in the system settings table (162). Once activated, they retrieve the required information and simulate measure performance by entity over the time periods specified by the user (40) in the system settings table (162). In doing so, the bots will forecast the range of performance and risk that can be expected for the specified measure by entity within the confidence interval defined by the user (40) in the system settings table (162) for each scenario. The bots also create a summary of the overall risks facing the entity for the current measure. After the simulation bots complete their calculations, the resulting forecasts are saved in the scenario table (168) by entity and the risk summary is saved in the report table (153) in the contextbase (50) before processing advances to a software block 390.

The software in block 390 checks the measure layer table (145) and the system settings table (162) in the contextbase (50) to see if probabilistic relational models were used. If probabilistic relational models were used, then processing advances to a software block 398. Alternatively, if the current calculations did not rely on probabilistic relational models, then processing advances to a software block 391.

The software in block 391 checks the bot date table (163) and deactivates measure bots with creation dates before the current system date. The software in block 391 then retrieves the information from the system settings table (162), the measure layer table (145), the entity schema table (157) as required to initialize bots for each context element, context factor, context resource, combination or performance driver for the measure being analyzed. Bots are independent components of the application software of the present invention that complete specific tasks. In the case of measure bots, their task is to determine the net contribution of the network of elements, factors, resources, events, combinations and performance drivers to the measure being analyzed. The relative contribution of each element, factor, resource, combination and performance driver is determined by using a series of predictive models to find the best fit relationship between the context element vectors, context factor vectors, combination vectors and performance drivers and the measure. The system of the present invention uses different types of predictive models to identify the best fit relationship: neural network; CART; projection pursuit regression; generalized additive model (GAM); GARCH; MMDR; MARS, redundant regression network; boosted Naïve Bayes Regression; relevance vector, hierarchical Bayes, the support vector method; markov; linear regression; and stepwise regression. The model having the smallest amount of error as measured by applying the root mean squared error algorithm to the test data is the best fit model. Other error algorithms and/or uncertainty measures including entropy measures may also be used. The “relative contribution algorithm” used for completing the analysis varies with the model that was selected as the “best-fit”. For example, if the “best-fit” model is a neural net model, then the portion of the measure attributable to each input vector is determined by the formula shown in Table 47.

TABLE 47
( k = 1 k = m j = 1 j = n I jk × O k / j = 1 j = n I ik ) / k = 1 k = m j = 1 j = n I jk × O k
Where
Ijk = Absolute value of the input weight from input node j to hidden node k
Ok = Absolute value of output weight from hidden node k
M = number of hidden nodes
N = number of input nodes

After completing the best fit calculations, the bots review the lives of the context elements that impact measure performance. If one or more of the elements has an expected life that is shorter than the forecast time period stored in the system settings, then a separate model will be developed to reflect the removal of the impact from the element(s) that are expiring. The resulting values for relative context element and context factor contributions to measure performance are and saved in the entity schema table (157) by entity and entity. If the calculations are related to a commercial business then the value of each contribution will be saved. The overall model of measure performance is saved in the measure layer table (145) by entity and entity. Every measure bot contains the information shown in Table 48.

TABLE 48
1. Unique ID number (based on date, hour, minute, second of creation)
2. Creation date (date, hour, minute, second)
3. Mapping information
4. Storage location
5. Hierarchy of Group
6. Entity
7. Measure
8. Element, factor, resource combination or performance driver

After the measure bots are initialized by the software in block 366 they activate in accordance with the frequency specified by the user (40) in the system settings table (162). After being activated, the bots retrieve information and complete the analysis of the measure performance. As described previously, the resulting relative contribution percentages are saved in the entity schema table (157) by entity. The overall model of measure performance is saved in the measure layer table (145) by entity before processing advances to a software block 392.

Before continuing the discussion the remaining calculations in this section it is appropriate to briefly review the processing that has been completed in this portion of system (100) processing. At this point, the element layer table (141), transaction layer table (142), resource layer table (143) and environment layer table (149) contain information that defines the administrative status of the entity by element and factor. As detailed above, the relationship layer table (144) now contains information that identifies the inter-relationship between the different elements, resources, risks and factors that drive measure performance. The measure layer table (145) now contains information that identifies the elements, resources and factors that support measure performance by entity. The measure layer table (145) also contains a summary of the event risks, element risks, resource risks and factor risks that threaten measure performance. The event risks include standard event risks, competitor risks, contingent liabilities and extreme risks while the element, factor and resource risks are primarily variability risks. In short, the contextbase (50) now contains a complete picture of entity function measure performance. In the steps that follow, the contextbase (50) will be updated to support the analysis of entity measure relevance, the alignment of measures for the relevant hierarchy will be evaluated, the efficient frontier for entity measure performance will be defined and the relevant entity ontology will be formalized and stored. The next step in this processing is completed in software block 392.

The software in block 392 checks the measure layer table (145) in the contextbase (50) to determine if all entity measures are current. If all measures are not current, then processing returns to software block 302 and the processing described above for this portion (300) of the application software is repeated. Alternatively, if all measure models are current, then processing advances to a software block 394.

The software in block 394 retrieves the previously stored values for measure performance from the measure layer table (145) before processing advances to a software block 395. The software in block 395 checks the bot date table (163) and deactivates measure relevance bots with creation dates before the current system date. The software in block 395 then retrieves the information from the system settings table (162) and the measure layer table (145) as required to initialize a bot for each entity being analyzed bots are independent components of the application software of the present invention that complete specific tasks. In the case of measure relevance bots, their tasks are to determine the relevance of each of the different measures to entity performance and determine the priority that appears to be placed on each of the different measures is there is more than one. The relevance and ranking of each measure is determined by using a series of predictive models to find the best fit relationship between the measures and entity performance. The system of the present invention uses several different types of predictive models to identify the best fit relationship: neural network; CART; projection pursuit regression; generalized additive model (GAM); GARCH; MMDR; redundant regression network; markov, boosted naive Bayes Regression; the support vector method; linear regression; and stepwise regression. The model having the smallest amount of error as measured by applying the root mean squared error algorithm to the test data is the best fit model. Other error algorithms including entropy measures may also be used. Bayes models are used to define the probability associated with each relevance measure and the Viterbi algorithm is used to identify the most likely contribution of all elements, factors, resources and risks by entity. The relative contributions are saved in the measure layer table (145) by entity. Every measure relevance bot contains the information shown in Table 49.

TABLE 49
1. Unique ID number (based on date, hour, minute, second of creation)
2. Creation date (date, hour, minute, second)
3. Mapping information
4. Storage location
5. Hierarchy of Group
6. Entity
7. Measure

After the measure relevance bots are initialized by the software in block 375 they activate in accordance with the frequency specified by the user (40) in the system settings table (162). After being activated, the bots retrieve information and complete the analysis of the measure performance. As described previously, the relative measure contributions to measure performance and the associated probability are saved in the measure layer table (145) by entity before processing advances to a software block 396.

The software in block 396 retrieves information from the measure table (145) and then checks the measures for the entity hierarchy to determine if the different levels are in alignment. As discussed previously, lower level measures that are out of alignment can be identified by the presence of measures from the same level with more impact on entity measure performance. For example, employee training could be shown to be a strong performance driver for the entity. If the human resources department (that is responsible for both training and performance evaluations) was using only a timely performance evaluation measure, then the measures would be out of alignment. If measures are out of alignment, then the software in block 396 prompts the manager (41) via the measure edit data window (708) to change the measures by entity as required to bring them into alignment. Alternatively, if measures by entity are in alignment, then processing advances to a software block 397.

The software in block 397 checks the bot date table (163) and deactivates frontier bots with creation dates before the current system date. The software in block 377 then retrieves information from the event risk table (156), the system settings table (162) and the scenarios table (168) as required to initialize frontier bots for each scenario. Bots are independent components of the application software of the present invention that complete specific tasks. In the case of frontier bots, their primary task is to define the efficient frontier for entity performance measures under each scenario. The top leg of the efficient frontier for each scenario is defined by successively adding the features, options and performance drivers that improve performance while increasing risk to the optimal mix in resource efficiency order. The bottom leg of the efficient frontier for each scenario is defined by successively adding the features, options and performance drivers that decrease performance while decreasing risk to the optimal mix in resource efficiency order. Every frontier bot contains the information shown in Table 50.

TABLE 50
1. Unique ID number (based on date, hour, minute, second of creation)
2. Creation date (date, hour, minute, second)
3. Mapping information
4. Storage location
5. Entity
6. Scenario: normal, extreme and blended

After the software in block 397 initializes the frontier bots, they activate in accordance with the frequency specified by the user (40) in the system settings table (162). After completing their calculations, the results of all 3 sets of calculations (normal, extreme and most likely) are saved in the report table (153) in sufficient detail to generate a chart like the one shown in FIG. 11 before processing advances to a software block 398.

The software in block 398 takes the previously stored entity schema from the entity schema table (157) and combines it with the relationship information in the relationship layer table (144) and the measure layer table (145) to develop the entity ontology. The ontology is then stored in the ontology table (152) using the OWL language. Use of the rdf (resource description framework) based OWL language will enable the communication and synchronization of the entities ontology with other entities and will facilitate the extraction and use of information from the semantic web. After the relevant entity ontology is saved in the contextbase(50), processing advances to a software block 402.

The flow diagrams in FIG. 8A and FIG. 8B detail the processing that is completed by the portion of the application software (400) that identifies valid context space (and principles), generates context frames and optionally displays and prints management reports detailing the measure performance of an entity. Processing in this portion of the application starts in software block 402.

The software in block 402 calculates expected uncertainty by multiplying the user (40) and subject matter expert (42) estimates of narrow system (4) uncertainty by the relative importance of the data from the narrow system for each measure. The expected uncertainty for each measure is expected to be lower than the actual uncertainty (measured using R2 as discussed previously) because total uncertainty is a function of data uncertainty plus parameter uncertainty (i.e. are the specified elements, resources and factors the correct ones) and model uncertainty (does the model accurately reflect the relationship between the data and the measure). After saving the uncertainty information in the uncertainty table (150) processing advances to a software block 403.

The software in block 403 retrieves information from the system settings table (162), the element layer table (141), the transaction layer table (142), the resource layer table (143), the relationship layer table (144), the measure layer table (145), the environment layer table (149), the registration layer table (154), the event risk table (156) and the entity schema table (157) as required to define context frames for every entity specified by the user (40) in the system settings table. The resulting frame definitions are given a unique identification number that identifies the time, data and entity before being stored in the context frame table (160). After storage is complete, processing advances to a software block 410.

The software in block 410 retrieves information from the relationship layer table (144), the measure layer table (145) and the context frame table (160) as required to define the valid context space for the current relationships and measures stored in the contextbase (50). The current measures and relationships are compared to previously stored context frames to determine the range of contexts in which they are valid with the confidence interval specified by the user (40) in the system settings table (162). The resulting list of valid frame definitions stored in the context space table (151). The software in this block also completes a stepwise elimination of each user specified constraint. This analysis helps determine the sensitivity of the results and may indicate that it would be desirable to use some resources to relax one or more of the established constrains. The results of this analysis is stored in the context space table (151) before processing advances to a software block 410.

The software in block 413 displays an influence diagram in a format similar to that shown in FIG. 2A and prompts the user (40) via the frame definition data window (709) to define additional context frames or sub context frames and to define the access rights for each of the defined frames by establishing permission rights for elements in the element layer table (141) and guests—note this includes employees, members and partners. The user (40) is prompted to establish these relationships for all established context frames and sub-context frames. The information regarding access permission by element is stored in the id to frame table (165) in the contextbase (50). If the user defines new frames, then the user (40) will be prompted to provide the access information for the new frame when it is established. If the user defines new frames, then the information required to define the frame—a combination of measures and the related context layers, is retrieved from the element layer table (141), the transaction layer table (142), the resource layer table (143), the relationship layer table (144), the measure layer table (145), the environment layer table (149), the registration layer table (154), the event risk table (156) and/or the entity schema table (157). The new context frame specification is stored in the context frame table (160). The sub context frames and context frames developed by the software in block 402 will identify and include information regarding all elements, resources, factors, actions, events, relationships and measures that are impacted by a change in the specified context frame. In block 413, the user (40) has the option of limiting the elements, resources, factors and events included in the frame to include only those elements that have a certain level of function measure impact. For example, if a change in supply chain operation had a very weak causal impact on brand strength, then brand information could be excluded from a supply chain sub context frame created by the user (40). The software in block 413 can also define context frames and sub context frames for event and impact analysis using the same procedure described for developing measure context frames. The newly defined context frames and sub context frames for events, impacts and measures are stored in the context frame table (160) before processing passes to a software block 414.

The software in block 414 checks the system settings table (162) in the contextbase (50) to determine if a natural language interface (714) is going to be used. If a natural language interface is going be used, then processing advances to a software block (420). Alternatively, if a natural language interface is not going to be used, then processing advances to a software block 415.

The software in block 415 supports the activities of the system interface window (711). The system interface window (711) is where the Complete Context™ Suite (625), narrow systems (4) and devices (3) synchronize and replicate the context frames and/or sub-context frames they use in processing, completing transactions and supporting a user (40), manager (41) or collaborator (43). Access to the different frames is controlled by the information stored in the id to frame table (165) in the prior step. As shown in FIG. 10, devices (3), narrow systems (4) and the Complete Context™ Suite (625) interface with software block 720 that manages the sessions. The id information provided by the Complete Context™ applications (625), devices (3) and/or narrow systems (4) to the software in block 720 determines which context frames will be synchronized and/or replicated. Processing in the interface passes from block 720 to block 722 where the software in the block supports translation between other languages and ontologies as required to complete transactions and analyses in automated fashion. The applications in the Complete Context™ Suite (625) all have the ability to support and integrate with other ontologies as required. After translations are completed, processing passes to software block 724 which will identify this session as an output session. Processing in the interface then passes to a software block 728.

The software in block 728 completes three primary functions. First, it interacts with each device (3) and narrow system (4) as required identify the context quotient for that device or system. The context quotient is a score that is given to each device (3) and narrow system (4) that identifies the relative ability of the device (3) or narrow system (4) to flexibly process information from the seven different types of context layers. The scores range from four to two hundred with two hundred being the highest score. The applications in the Complete Context™ Suite (625) all have context quotients of two hundred (200). Twenty points are given for each type context layer the device (3) or narrow system (4) is able to process. For example, a supply chain optimization system with the ability to optimize supplier costs (measure layer) given an inventory status (resource layer) and order status (transaction layer) would be given sixty points—twenty points for each of the three layers it is able to process. If the supply chain optimization system was able to change its optimal solution based on new information regarding the relationship between the supply chain and other context elements like the customer base, brand and channel partners, then another twenty points would be given for its ability to process relationship layer information. Another seven points are awarded for the ability to respond to changes in the mix and/or the relative importance of different attributes within each context layer. For example, it is not uncommon for devices (3) and narrow systems (4) to include the ability to respond to one or two factors from the social environment in their programming. However, as new elements, factors and resources become important, these systems often fail to recognize the change and consequently decline in usefulness. The exact points awarded for each “ability” are not particularly important, what is important is that the context quotient score reflects the ability of each device (3) and narrow system (4) to process each of the seven types of context layers in the current environment and in the future when the relative importance of different attributes within each layer are expected to change. The results of the evaluation of the context quotient for devices (3) and narrow systems (4) seeking data from the system of the present invention are saved in the context quotient table (162) in the contextbase (50).

The second function of the software in block 728 is to provide context frame information to each device (3) or narrow system (4) with a layer mix and a format that can be used by that device (3) or narrow system (4). The results of the context quotient analysis are used to determine which context layers will be included in the context frame sent to each device (3) and/or narrow system (4) for processing. After defining a context frame for the device (3) and/or narrow system (4) in a manner similar to that described previously for complete context frames, a packet containing the required information is transmitted to a device (3) or narrow system (4) via a network (45) or grid. Alternatively, an RSS feed or a network operating system, operating system and/or middleware layer(s) containing the required information could be propagated. Existing layers in operating systems and middleware could also be used to communicate the required information. At the same time, the devices (3) and/or narrow systems (4) can transmit changes in the context frame they are utilizing via the same interface to ensure synchronization between the central system and the remote devices (3) and systems (4). These changes are passed to software block 724 where they complete the data input processing described previously.

The third function of the software in block 728 is to deliver full context frames and sub-context frames along with the related valid context space and uncertainty information to the applications Complete Context™ Suite (625) upon request. Processing continues to a software block 431.

If the natural language interface (714) is going to be used, then processing advances to a software block 420 instead of software block 415. The software in block 420 completes the same processing described above for block 415 as required to identify the context quotient, develop the appropriate context frames and synchronize context information with the narrow systems (4), devices (3) and/or applications in the Complete Context™ Suite (625). The software in block 420 also combines the ontology developed in prior steps in processing with well known language processing methods to provide a true natural language interface to the system of the present invention (100).

As shown in FIG. 17, the processing to support the development of a true natural language interface starts with the receipt of audio input to the natural language interface (714) from audio sources (1), video sources (2), devices (3), narrow systems (4), a portal (11) and/or applications in the Complete Context™ Suite (625). From there, the audio input passes to a software block 750 where the input is digitized in a manner that is well know. After being digitized, the input passes to a software block 751 where it is segmented in phonemes in a manner that is well known. The phonemes are then passed to a software block 752 where in a manner that is well known, they are compared to previously stored phonemes in the phoneme database (755) to identify the most probable set of words contained in the input. The most probable set of words are saved in the natural language table (169) in the contextbase (50) before processing advances to a software block 753. The software in block 753 compares the word set to previously stored phrases in the phrase database (760) and the ontology from the ontology table (152) to classify the word set as one or more phrases. After the classification is completed and saved in the natural language table (169), the software in block 754 uses the classified input and ontology to guide the completion of any actions that may be required by other parts of the system (100), generate a response to the translated input and transmit response to the natural language interface (714) that is then forwarded to a device (3), a narrow system (4), an audio output device (9), a portal (11) or an application in the Complete Context™ Suite (625). This process continues until all natural language input has been processed and the context information has been synchronized with the appropriate device, systems and/or applications. When this processing is complete, processing advances to a software block 431.

The software in block 431 checks the system settings table (162) in the contextbase (50) to determine if applications or bots are going to be created. If applications or bots are not going to be created, then processing advances to a software block 433. Alternatively, if applications or bots are going to be created, then processing advances to a software block 432.

The software in block 432 prompts the user (40) via the development data window (711) to define the type of program that is going to be developed. It is worth noting that more than one user (40) can participate in program development—a feature that is particularly useful in developing programs to support shared context and multi domain knowledge development. The entity centric computer system (100) supports four distinct types of development projects:

If the first option is selected, then the user (40) is given the option of using pre-defined patterns and/or patterns extracted from existing narrow systems (4) to modify one or more of the applications in the Complete Context™ Suite (625). The user (40) can also program the application extensions using C++, C#, Prolog or Java with or without the use of patterns.

If the second option is selected, then the user (40) is shown a display of the previously developed entity schema (157) for use in defining an assignment and context frame for a Complete Context™ Bot. (650). After the assignment specification is stored in the bot assignment table (167) the software in block 432 defines a probabilistic simulation of bot performance under the three previously defined scenarios. The results of the simulations are displayed to the user (40) via the development data window (712). The software in block 432 then gives the user (40) the option of modifying the bot assignment or approving the bot assignment. If the user (40) decides to change the bot assignment, then the change in assignment is saved in the bot assignment table (167) and the process described for this software block is repeated. Alternatively, if the user (40) does not change the bot assignment, then the software in block 432 completes two primary functions. First, it combines the bot assignment with results of the simulations to develop the set of program instructions that will maximize bot performance under the forecast scenarios. The bot programming includes the entity ontology and is saved in the bot program table (168). Any number of languages can be used to program the bots including C++, Java and Prolog. Prolog is used because it readily supports the situation calculus analyses used by the bot (650) to evaluate their situation and select the appropriate course of action. The Complete Context Bot (650) has the ability to interact with bots and entities that use other ontologies in an automated fashion.

If the third option is selected, then the previously developed information about the context quotient for the device (3) is used to select the pre-programmed options (i.e. ring, don't ring, silent ring, etc.) that will be presented to the user (40) for implementation. The user (40) will also be given the ability to construct new rules for the device (3) using the parameters contained within the device-specific context frame.

If the fourth option is selected, then the user (40) is given a pre-defined context frame interface shell along with the option of using pre-defined patterns and/or patterns extracted from existing narrow systems (4) to develop a new application. The user (40) can also program the new application completely using C++, C#, Prolog or Java.

When programming is complete using one of the four options, processing advances to a software block 433. The software in block 433 prompts the user (40) via the report display and selection data window (713) to review and select reports for printing. The format of the reports is either graphical, numeric or both depending on the type of report the user (40) specified in the system settings table (162). If the user (40) selects any reports for printing, then the information regarding the selected reports is saved in the report table (152). After the user (40) has finished selecting reports, the selected reports are displayed to the user (40) via the report display and selection data window (713). After the user (40) indicates that the review of the reports has been completed, processing advances to a software block 434. The processing can also pass to block 434 if the maximum amount of time to wait for no response specified by the user (40) in the system settings table is exceeded before the user (40) responds.

The software in, block 434 checks the report table (152) to determine if any reports have been designated for printing. If reports have been designated for printing, then processing advances to a block 435. It should be noted that in addition to standard reports like a performance risk matrix and the graphical depictions of the efficient frontier shown (FIG. 11), the system of the present invention can generate reports that rank the elements, factors, resources and/or risks in order of their importance to measure performance and/or measure risk by entity, by measure and/or for the entity as a whole. A format for a report of this type is shown in FIG. 15. The system can also produce reports that compare results to plan for actions, impacts and measure performance if expected performance levels have been specified and saved in appropriate context layer. The software in block 435 sends the designated reports to the printer (118). After the reports have been sent to the printer (118), processing advances to a software block 437. Alternatively, if no reports were designated for printing, then processing advances directly from block 434 to block 437.

The software in block 437 checks the system settings table (162) to determine if the system is operating in a continuous run mode. If the system is operating in a continuous run mode, then processing returns to block 205 and the processing described previously is repeated in accordance with the frequency specified by the user (40) in the system settings table (162). Alternatively, if the system is not running in continuous mode, then the processing advances to a block 438 where the system stops.

Thus, the reader will see that the system and method described above transforms data, information and knowledge from disparate devices (3) and narrow systems (4) into a entity centric computer system (100). The level of detail, breadth and speed of the analysis gives users of the system (100) the ability to create knowledge and apply it to solving real world problems in an fashion that is uncomplicated and powerful. This system (100) can be used for integrating and managing the disparate activities of an organization where knowledge development efforts in one or more domains are being managed.

While the above description contains many specificities, these should not be construed as limitations on the scope of the invention, but rather as an exemplification of one embodiment thereof. Accordingly, the scope of the invention should be determined not by the embodiment illustrated, but by the appended claims and their legal equivalents.

Eder, Jeff Scott

Patent Priority Assignee Title
10149092, Apr 04 2005 X One, Inc. Location sharing service between GPS-enabled wireless devices, with shared target location exchange
10165059, Apr 04 2005 X One, Inc. Methods, systems and apparatuses for the formation and tracking of location sharing groups
10200811, Apr 04 2005 X One, Inc. Map presentation on cellular device showing positions of multiple other wireless device users
10242407, Sep 24 2013 Innovative Market Analysis, LLC; INNOVATIVE MARKET ANALYSIS, LLC D B A METASTOCK Financial instrument analysis and forecast
10248732, Jan 23 2012 Microsoft Technology Licensing, LLC Identifying related entities
10299071, Apr 04 2005 X One, Inc. Server-implemented methods and systems for sharing location amongst web-enabled cell phones
10313826, Apr 04 2005 X One, Inc. Location sharing and map support in connection with services request
10341808, Apr 04 2005 X One, Inc. Location sharing for commercial and proprietary content applications
10341809, Apr 04 2005 X One, Inc. Location sharing with facilitated meeting point definition
10402756, Oct 19 2005 International Business Machines Corporation Capturing the result of an approval process/workflow and declaring it a record
10452660, May 31 2013 International Business Machines Corporation Generation and maintenance of synthetic context events from synthetic context objects
10474708, May 12 2014 SALESFORCE COM, INC Entity-centric knowledge discovery
10542961, Jun 15 2015 The Research Foundation for The State University of New York System and method for infrasonic cardiac monitoring
10559180, Sep 27 2017 Johnson Controls Tyco IP Holdings LLP Building risk analysis system with dynamic modification of asset-threat weights
10559181, Sep 27 2017 Johnson Controls Tyco IP Holdings LLP Building risk analysis system with risk combination for multiple threats
10565844, Sep 27 2017 Johnson Controls Tyco IP Holdings LLP Building risk analysis system with global risk dashboard
10750309, Apr 04 2005 X One, Inc. Ad hoc location sharing group establishment for wireless devices with designated meeting point
10750310, Apr 04 2005 X One, Inc. Temporary location sharing group with event based termination
10750311, Apr 04 2005 X One, Inc. Application-based tracking and mapping function in connection with vehicle-based services provision
10791414, Apr 04 2005 X One, Inc. Location sharing for commercial and proprietary content applications
10831163, Aug 27 2012 Johnson Controls Tyco IP Holdings LLP Syntax translation from first syntax to second syntax based on string analysis
10839021, Jun 06 2017 SALESFORCE COM, INC Knowledge operating system
10856099, Apr 04 2005 X One, Inc. Application-based two-way tracking and mapping function with selected individuals
10859984, Aug 27 2012 Johnson Controls Tyco IP Holdings LLP Systems and methods for classifying data in building automation systems
10975846, Jul 29 2015 GE INFRASTRUCTURE TECHNOLOGY LLC Method and system to optimize availability, transmission, and accuracy of wind power forecasts and schedules
11024292, Feb 10 2017 Johnson Controls Technology Company Building system with entity graph storing events
11088952, Jun 12 2019 Juniper Networks, Inc.; Juniper Networks, Inc Network traffic control based on application path
11106741, Jun 06 2017 SALESFORCE COM, INC Knowledge operating system
11151983, Feb 10 2017 Johnson Controls Technology Company Building system with an entity graph storing software logic
11158306, Feb 10 2017 Johnson Controls Technology Company Building system with entity graph commands
11195401, Sep 27 2017 Johnson Controls Tyco IP Holdings LLP Building risk analysis system with natural language processing for threat ingestion
11216742, Mar 04 2019 IOCURRENTS, INC Data compression and communication using machine learning
11230017, Oct 17 2018 PETOI, LLC Robotic animal puzzle
11275348, Feb 10 2017 Johnson Controls Technology Company Building system with digital twin based agent processing
11276288, Sep 27 2017 Johnson Controls Tyco IP Holdings LLP Building risk analysis system with dynamic modification of asset-threat weights
11280509, Jul 17 2017 Johnson Controls Technology Company Systems and methods for agent based building simulation for optimal control
11307538, Feb 10 2017 Johnson Controls Technology Company Web services platform with cloud-eased feedback control
11314726, Sep 27 2017 Johnson Controls Tyco IP Holdings LLP Web services for smart entity management for sensor systems
11314788, Sep 27 2017 Johnson Controls Tyco IP Holdings LLP Smart entity management for building management systems
11327451, Feb 10 2017 Johnson Controls Technology Company Building smart entity system with agent based communication and control
11356799, Apr 04 2005 X One, Inc. Fleet location sharing application in association with services provision
11360447, Feb 10 2017 Johnson Controls Technology Company Building smart entity system with agent based communication and control
11360959, Sep 27 2017 Johnson Controls Tyco IP Holdings LLP Building risk analysis system with dynamic and base line risk
11392573, Nov 11 2020 WELLS FARGO BANK, N A Systems and methods for generating and maintaining data objects
11397731, Apr 07 2019 B G NEGEV TECHNOLOGIES AND APPLICATIONS LTD , AT BEN-GURION UNIVERSITY Method and system for interactive keyword optimization for opaque search engines
11409777, May 12 2014 SALESFORCE COM, INC Entity-centric knowledge discovery
11409925, Apr 12 2019 Tata Consultancy Services Limited Systems and methods for simulation of electricity value ecosystem using agent based modeling approach
11442424, Mar 24 2017 Johnson Controls Tyco IP Holdings LLP Building management system with dynamic channel communication
11468355, Mar 04 2019 ioCurrents, Inc. Data compression and communication using machine learning
11478215, Jun 15 2015 The Research Foundation for The State University o System and method for infrasonic cardiac monitoring
11501251, Mar 15 2017 Walmart Apollo, LLC System and method for determination and management of root cause for inventory problems
11640565, Nov 11 2020 WELLS FARGO BANK, N A Systems and methods for relationship mapping
11699903, Jun 07 2017 Johnson Controls Tyco IP Holdings LLP Building energy optimization system with economic load demand response (ELDR) optimization and ELDR user interfaces
11704311, Nov 24 2021 Johnson Controls Tyco IP Holdings LLP Building data platform with a distributed digital twin
11709965, Sep 27 2017 Johnson Controls Technology Company Building system with smart entity personal identifying information (PII) masking
11714930, Nov 29 2021 Johnson Controls Tyco IP Holdings LLP Building data platform with digital twin based inferences and predictions for a graphical building model
11726632, Jul 27 2017 Johnson Controls Technology Company Building management system with global rule library and crowdsourcing framework
11727738, Nov 22 2017 Johnson Controls Tyco IP Holdings LLP Building campus with integrated smart environment
11733663, Jul 21 2017 Johnson Controls Tyco IP Holdings LLP Building management system with dynamic work order generation with adaptive diagnostic task details
11734261, Sep 27 2017 Johnson Controls Tyco IP Holdings LLP Web services platform with integration and interface of smart entities with enterprise applications
11735021, Sep 27 2017 Johnson Controls Tyco IP Holdings LLP Building risk analysis system with risk decay
11741165, Sep 30 2020 Johnson Controls Tyco IP Holdings LLP Building management system with semantic model integration
11741812, Sep 27 2017 Johnson Controls Tyco IP Holdings LLP Building risk analysis system with dynamic modification of asset-threat weights
11754982, Aug 27 2012 Johnson Controls Tyco IP Holdings LLP Syntax translation from first syntax to second syntax based on string analysis
11755604, Feb 10 2017 Johnson Controls Technology Company Building management system with declarative views of timeseries data
11761653, May 10 2017 Johnson Controls Tyco IP Holdings LLP Building management system with a distributed blockchain database
11762343, Jan 28 2019 Johnson Controls Tyco IP Holdings LLP Building management system with hybrid edge-cloud processing
11762351, Nov 15 2017 Johnson Controls Tyco IP Holdings LLP Building management system with point virtualization for online meters
11762353, Sep 27 2017 Johnson Controls Technology Company Building system with a digital twin based on information technology (IT) data and operational technology (OT) data
11762356, Sep 27 2017 Johnson Controls Technology Company Building management system with integration of data into smart entities
11762362, Mar 24 2017 Johnson Controls Tyco IP Holdings LLP Building management system with dynamic channel communication
11762886, Feb 10 2017 Johnson Controls Technology Company Building system with entity graph commands
11763266, Jan 18 2019 Johnson Controls Tyco IP Holdings LLP Smart parking lot system
11764991, Feb 10 2017 Johnson Controls Technology Company Building management system with identity management
11768004, Mar 31 2016 Johnson Controls Tyco IP Holdings LLP HVAC device registration in a distributed building management system
11768826, Sep 27 2017 Johnson Controls Tyco IP Holdings LLP Web services for creation and maintenance of smart entities for connected devices
11769066, Nov 17 2021 Johnson Controls Tyco IP Holdings LLP Building data platform with digital twin triggers and actions
11769117, Jan 18 2019 Johnson Controls Tyco IP Holdings LLP Building automation system with fault analysis and component procurement
11770020, Jan 22 2016 Johnson Controls Technology Company Building system with timeseries synchronization
11770269, Dec 31 2019 Johnson Controls Tyco IP Holdings LLP Building data platform with event enrichment with contextual information
11774920, May 04 2016 Johnson Controls Technology Company Building system with user presentation composition based on building context
11774922, Jun 15 2017 Johnson Controls Technology Company Building management system with artificial intelligence for unified agent based control of building subsystems
11774930, Feb 10 2017 Johnson Controls Technology Company Building system with digital twin based agent processing
11775938, Jan 18 2019 Johnson Controls Tyco IP Holdings LLP Lobby management system
11777756, Dec 31 2019 Johnson Controls Tyco IP Holdings LLP Building data platform with graph based communication actions
11777757, Dec 31 2019 Johnson Controls Tyco IP Holdings LLP Building data platform with event based graph queries
11777758, Dec 31 2019 Johnson Controls Tyco IP Holdings LLP Building data platform with external twin synchronization
11777759, Dec 31 2019 Johnson Controls Tyco IP Holdings LLP Building data platform with graph based permissions
11778030, Feb 10 2017 Johnson Controls Technology Company Building smart entity system with agent based communication and control
11778415, Apr 04 2005 Xone, Inc. Location sharing application in association with services provision
11782407, Nov 15 2017 Johnson Controls Tyco IP Holdings LLP Building management system with optimized processing of building system data
11784846, Dec 31 2019 Johnson Controls Technology Company Building data platform with a tenant entitlement model
11784847, Dec 31 2019 Johnson Controls Tyco IP Holdings LLP Building data platform with graph based capabilities
11790009, Jun 06 2017 Salesforce, Inc. Knowledge operating system
11792039, Feb 10 2017 Johnson Controls Technology Company Building management system with space graphs including software components
11796974, Nov 16 2021 Johnson Controls Tyco IP Holdings LLP Building data platform with schema extensibility for properties and tags of a digital twin
11809423, Apr 07 2019 G. Negev Technologies and Applications Ltd., at Ben-Gurion University Method and system for interactive keyword optimization for opaque search engines
11809461, Feb 10 2017 Johnson Controls Technology Company Building system with an entity graph storing software logic
11824680, Dec 31 2019 Johnson Controls Tyco IP Holdings LLP Building data platform with a tenant entitlement model
11874635, Oct 21 2015 Johnson Controls Technology Company Building automation system with integrated building information model
11874809, Jun 08 2020 Johnson Controls Tyco IP Holdings LLP Building system with naming schema encoding entity type and entity relationships
11880677, Apr 06 2020 Johnson Controls Tyco IP Holdings LLP Building system with digital network twin
11892180, Jan 06 2017 Johnson Controls Tyco IP Holdings LLP HVAC system with automated device pairing
11894676, Jan 22 2016 Johnson Controls Technology Company Building energy management system with energy analytics
11894944, Dec 31 2019 Johnson Controls Tyco IP Holdings LLP Building data platform with an enrichment loop
11899413, Oct 21 2015 Johnson Controls Technology Company Building automation system with integrated building information model
11899723, Jun 22 2021 Johnson Controls Tyco IP Holdings LLP Building data platform with context based twin function processing
11900287, May 25 2017 Johnson Controls Tyco IP Holdings LLP Model predictive maintenance system with budgetary constraints
11902375, Oct 30 2020 Johnson Controls Tyco IP Holdings LLP Systems and methods of configuring a building management system
11916694, Dec 31 2019 Johnson Controls Tyco IP Holdings LLP Building data platform with graph based capabilities
7480641, Apr 07 2006 HMD Global Oy Method, apparatus, mobile terminal and computer program product for providing efficient evaluation of feature transformation
7565336, May 07 2001 QUEST SOFTWARE INC F K A DELL SOFTWARE INC ; Aventail LLC Method and apparatus for measurement, analysis, and optimization of content delivery
7702497, Dec 05 2006 LENOVO INTERNATIONAL LIMITED Method for recommending upgrade components for a computer system
7720779, Jan 23 2006 QUANTUM LEAP RESEARCH, INC Extensible bayesian network editor with inferencing capabilities
7720782, Dec 22 2006 Liberty Peak Ventures, LLC Automated predictive modeling of business future events based on historical data
7778856, Dec 05 2001 International Business Machines Corporation System and method for measuring and managing operational risk
7840604, Jun 04 2007 Precipia Systems Inc. Method, apparatus and computer program for managing the processing of extracted data
7856436, Dec 23 2005 LinkedIn Corporation Dynamic holds of record dispositions during record management
7912795, Dec 22 2006 Liberty Peak Ventures, LLC Automated predictive modeling of business future events based on transformation of modeling variables
7912902, Feb 13 2003 NYTELL SOFTWARE LLC Application service peering and aggregation
7941385, May 07 2001 QUEST SOFTWARE INC F K A DELL SOFTWARE INC ; Aventail LLC Method and apparatus for measurement, analysis, and optimization of content delivery
8037029, Oct 10 2006 International Business Machines Corporation Automated records management with hold notification and automatic receipts
8065266, Jan 03 2006 Informatica Corporation Relationship data management
8103130, Mar 07 2005 Cimpress Schweiz GmbH Automated image processing
8150803, Jan 03 2006 Informatica Corporation Relationship data management
8166048, Jun 27 2005 Informatica Corporation Method and apparatus for data integration and management
8200622, May 31 2002 Informatica Corporation System and method for integrating, managing and coordinating customer activities
8214235, Jun 20 2006 TAIT, ANDREW M Method and apparatus for enterprise risk management
8271477, Jul 20 2007 Informatica Corporation Methods and systems for accessing data
8321474, Dec 21 2007 AGFA HEALTHCARE GMBH System and method for generating evaluation data
8352788, Jul 20 2009 International Business Machines Corporation Predictive monitoring with wavelet analysis
8385964, Apr 04 2005 Xone, Inc.; XONE, INC Methods and apparatuses for geospatial-based sharing of information by multiple devices
8392460, Jan 03 2006 Informatica Corporation Relationship data management
8457108, Dec 27 2004 AT&T Corp Method and apparatus for monitoring client software usage in end user device
8458105, Feb 12 2009 Decisive Analytics Corporation Method and apparatus for analyzing and interrelating data
8484140, Jun 09 2009 Microsoft Technology Licensing, LLC Feature vector clustering
8510229, Jan 31 2007 Sprint Communications Company L.P. Project efficiency analysis
8538458, Apr 04 2005 X One, Inc. Location sharing and tracking using mobile phones or other wireless devices
8583680, May 31 2002 Informatica Corporation System and method for integrating, managing and coordinating customer activities
8600870, Oct 29 2007 Fair Isaac Corporation Distributed scoring of data transactions
8639702, Dec 10 2010 ELEMENT DATA, INC System and method to classify and apply behavioral stimuli potentials to data in real time
8712441, Apr 04 2005 Xone, Inc.; X ONE, INC Methods and systems for temporarily sharing position data between mobile-device users
8750898, Apr 04 2005 X ONE, INC Methods and systems for annotating target locations
8756234, Nov 16 2004 The General Hospital Corporation Information theory entropy reduction program
8768804, May 06 2011 SYNERSCOPE BV Data analysis system
8798593, Apr 04 2005 X ONE, INC Location sharing and tracking using mobile phones or other wireless devices
8798645, Apr 04 2005 X ONE, INC Methods and systems for sharing position data and tracing paths between mobile-device users
8798647, Apr 04 2005 X One, Inc. Tracking proximity of services provider to services consumer
8831635, Apr 04 2005 X ONE, INC Methods and apparatuses for transmission of an alert to multiple devices
8868452, May 01 2008 Accenture Global Services Limited Smart grid deployment simulator
8892184, Oct 18 2010 Siemens Medical Solutions USA, Inc. Systems and methods for reducing interference in a dual modality imaging system
9014053, Dec 27 2004 AT&T Intellectual Property II, L.P. Method and apparatus for monitoring client software usage in end user device
9031581, Apr 04 2005 X One, Inc. Apparatus and method for obtaining content on a cellular wireless device based on proximity to other wireless devices
9043238, May 06 2011 SYNERSCOPE B.V. Data visualization system
9167558, Apr 04 2005 X One, Inc.; X ONE, INC Methods and systems for sharing position data between subscribers involving multiple wireless providers
9185522, Apr 04 2005 X One, Inc. Apparatus and method to transmit content to a cellular wireless device based on proximity to other wireless devices
9253616, Apr 04 2005 X One, Inc. Apparatus and method for obtaining content on a cellular wireless device based on proximity
9256909, Mar 30 2009 RESEARXIS, INC Scientific information management method
9275132, May 12 2014 SALESFORCE COM, INC Entity-centric knowledge discovery
9384572, May 06 2011 SYNERSCOPE B.V. Data analysis system
9467832, Apr 04 2005 X One, Inc. Methods and systems for temporarily sharing position data between mobile-device users
9552352, Nov 10 2011 Microsoft Technology Licensing, LLC Enrichment of named entities in documents via contextual attribute ranking
9584960, Apr 04 2005 X One, Inc. Rendez vous management using mobile phones or other mobile devices
9615204, Apr 04 2005 X One, Inc. Techniques for communication within closed groups of mobile devices
9654600, Dec 09 2011 Alibaba Group Holding Limited Method, client device and server of accessing network information through graphic code
9654921, Apr 04 2005 X One, Inc. Techniques for sharing position data between first and second devices
9672273, Feb 21 2014 International Business Machines Corporation Representing a machine-to-machine device model based on ontological relationships
9684708, Feb 21 2014 International Business Machines Corporation Representing a machine-to-machine device model based on ontological relationships
9736618, Apr 04 2005 X One, Inc. Techniques for sharing relative position between mobile devices
9749790, Apr 04 2005 X One, Inc. Rendez vous management using mobile phones or other mobile devices
9755988, May 30 2010 BARRACUDA NETWORKS, INC Method and system for arbitraging computer resources in a cloud computing environment
9842172, Dec 09 2011 Alibaba Group Holding Limited Method, client device and server of accessing network information through graphic code
9854394, Apr 04 2005 X One, Inc. Ad hoc location sharing group between first and second cellular wireless devices
9854402, Apr 04 2005 X One, Inc. Formation of wireless device location sharing group
9883360, Apr 04 2005 X One, Inc. Rendez vous management using mobile phones or other mobile devices
9942705, Apr 04 2005 X One, Inc. Location sharing group for services provision
9955298, Apr 04 2005 X One, Inc. Methods, systems and apparatuses for the formation and tracking of location sharing groups
9967704, Apr 04 2005 X One, Inc. Location sharing group map management
Patent Priority Assignee Title
3749892,
3933305, Aug 23 1974 Asset value calculators
4626992, May 21 1984 Motion Analysis Systems, Inc. Water quality early warning system
4656592, Oct 14 1983 U S PHILIPS CORPORATION, 100 E 42ND STREET, NEW YORK, NY 10017, A CORP OF Very large scale integrated circuit subdivided into isochronous regions, method for the machine-aided design of such a circuit, and method for the machine-aided testing of such a circuit
4821220, Jul 25 1986 Tektronix, Inc. System for animating program operation and displaying time-based relationships
4839804, Dec 30 1986 College Savings Bank Method and apparatus for insuring the funding of a future liability of uncertain cost
4943932, Nov 25 1986 Cimflex Teknowledge Corporation; TEKNOWLEDGE, INC Architecture for composing computational modules uniformly across diverse developmental frameworks
4989141, Jun 01 1987 Oracle International Corporation Computer system for financial analyses and reporting
5086479, Jun 30 1989 Hitachi, Ltd. Information processing system using neural network learning function
5128861, Dec 07 1988 Hitachi, Ltd. Inventory control method and system
5191522, Jan 18 1990 HARTFORD LIFE INSURANCE COMPANY Integrated group insurance information processing and reporting system based upon an enterprise-wide data structure
5193055, Mar 03 1987 NOAH SYSTEM, INC Accounting system
5214743, Oct 25 1989 Hitachi, Ltd. Information processing apparatus
5220559, Aug 31 1988 Fujitsu Limited Neuron architecture
5224034, Dec 21 1990 TTI Inventions C LLC Automated system for generating procurement lists
5228117, Apr 12 1990 HITACHI, LTD , Expert system development support system and expert system environment utilizing a frame processing technique
5237495, May 23 1990 Fujitsu Limited Production/purchase management processing system and method
5237496, Dec 07 1988 Hitachi, Ltd. Inventory control method and system
5295197, Jun 30 1989 Hitachi, Ltd. Information processing system using neural network learning function
5317504, Oct 23 1991 T.A.S. & Trading Co., Ltd. Computer implemented process for executing accounting theory systems
5359701, Apr 12 1990 Hitachi, Ltd. Expert system development support system and expert system environment utilizing a frame processing tecnique
5361201, Oct 19 1992 CORELOGIC INFORMATION RESOURCES, LLC F K A CORELOGIC US, INC AND F K A FIRST ADVANTAGE CORPORATION ; CORELOGIC DORADO, LLC F K A CORELOGIC DORADO CORPORATION AND F K A DORADO NETWORK SYSTEMS CORPORATION ; CORELOGIC, INC F K A FIRST AMERICAN CORPORATION ; CORELOGIC SOLUTIONS, LLC F K A MARKETLINX, INC AND F K A CORELOGIC REAL ESTATE SOLUTIONS, LLC F K A FIRST AMERICAN REAL ESTATE SOLUTIONS LLC AND F K A CORELOGIC INFORMATION SOLUTIONS, INC F K A FIRST AMERICAN CORELOGIC, INC ; CoreLogic Tax Services, LLC; CORELOGIC VALUATION SERVICES, LLC F K A EAPPRAISEIT LLC ; CORELOGIC REAL ESTATE INFORMATION SERVICES, LLC F K A FIRST AMERICAN REAL ESTATE INFORMATION SERVICES, INC Real estate appraisal using predictive modeling
5377122, Sep 05 1989 LSI Logic Corporation Logic compiler for design of circuit models
5406477, Aug 30 1991 HEWLETT-PACKARD DEVELOPMENT COMPANY, L P Multiple reasoning and result reconciliation for enterprise analysis
5408411, Jan 18 1991 Hitachi, Ltd. System for predicting behavior of automotive vehicle and for controlling vehicular behavior based thereon
5414621, Mar 06 1992 HOUGH COMPANY, INC , THE System and method for computing a comparative value of real estate
5459659, May 29 1992 Honda Giken Kogyo Kabushiki Kaisha Attitude stabilization control system for a legged mobile robot
5471611, Mar 13 1991 University of Strathcylde Computerised information-retrieval database systems
5485600, Nov 09 1992 ENGENUITY TECHNOLOGIES, INC Computer modelling system and method for specifying the behavior of graphical operator interfaces
5506938, Apr 12 1990 Hitachi, Ltd. Expert system development support system and expert system environment utilizing a frame processing technique
5524175, Oct 29 1992 Hitachi, Ltd.; Hitachi Micro Computer System, Ltd. Neuro-computer system for executing a plurality of controlling algorithms
5563988, Aug 01 1994 Massachusetts Institute of Technology Method and system for facilitating wireless, full-body, real-time user interaction with a digitally represented visual environment
5576965, Apr 16 1992 Hitachi, Ltd. Method and apparatus for aiding of designing process
5604840, Oct 25 1989 Hitachi, Ltd. Information processing apparatus
5621790, Nov 16 1993 Wilmington Trust, National Association, as Administrative Agent Method and system for optimization of telephone contact campaigns
5638492, Sep 08 1992 Hitachi, Ltd. Information processing apparatus and monitoring apparatus
5644727, Apr 15 1987 HOME ACCOUNT NETWORK, INC System for the operation and management of one or more financial accounts through the use of a digital communication and computation system for exchange, investment and borrowing
5649181, Apr 16 1993 SYBASE, Inc. Method and apparatus for indexing database columns with bit vectors
5666288, Apr 21 1995 Apple Inc Method and apparatus for designing an integrated circuit
5668591, Mar 30 1994 Sony Corporation Information terminal apparatus that is remotely programmed by radio waves and that displays input keys of program functions on a display
5677997, Jan 09 1995 Visa International Service Association; VISA U S A INC Method and apparatus for automated conformance and enforcement of behavior in application processing systems
5680305, Feb 16 1995 System and method for evaluating real estate
5694539, Aug 10 1994 Microsoft Technology Licensing, LLC Computer process resource modelling method and apparatus
5704045, Jan 09 1995 INVESTORS GUARANTY FUND, LTD System and method of risk transfer and risk diversification including means to assure with assurance of timely payment and segregation of the interests of capital
5704055, Jun 01 1993 International Business Machines Corporation Dynamic Reconfiguration of main storage and expanded storage by means of a service call logical processor
5706495, May 07 1996 International Business Machines Corporation Encoded-vector indices for decision support and warehousing
5715371, May 31 1996 THE CHASE MANHATTAN BANK, AS COLLATERAL AGENT Personal computer-based intelligent networks
5737581, Aug 30 1995 CHANDU CORPORATION Quality system implementation simulator
5742775, Jan 18 1995 INVESTORS GUARANTY FUND, LTD Method and apparatus of creating financial instrument and administering an adjustable rate loan system
5765154, Oct 19 1995 Fuji Xerox Co., Ltd. Resource management system
5774873, Mar 29 1996 MANHEIM SERVICES CORPORATION Electronic on-line motor vehicle auction and information system
5783909, Jan 10 1997 Relume Technologies, Inc Maintaining LED luminous intensity
5790778, Aug 07 1996 Microsoft Technology Licensing, LLC Simulated program execution error detection method and apparatus
5794219, Feb 20 1996 HANGER SOLUTIONS, LLC Method of conducting an on-line auction with bid pooling
5802501, Oct 28 1992 GRAFF ROSS HOLDINGS System and methods for computing to support decomposing property into separately valued components
5809282, Jun 07 1995 GRC INTERNATIONAL, INC Automated network simulation and optimization system
5812987, Aug 18 1993 BlackRock Institutional Trust Company, National Association Investment fund management method and system with dynamic risk adjusted allocation of assets
5812988, Dec 06 1993 INVESTMENTS ANALYTIC, INC Method and system for jointly estimating cash flows, simulated returns, risk measures and present values for a plurality of assets
5819237, Feb 13 1996 Financial Engineering Associates, Inc. System and method for determination of incremental value at risk for securities trading
5831853, Jun 07 1995 Xerox Corporation Automatic construction of digital controllers/device drivers for electro-mechanical systems using component models
5875431, Mar 15 1996 Legal strategic analysis planning and evaluation control system and method
5887120, May 31 1995 Oracle International Corporation Method and apparatus for determining theme for discourse
5905789, Oct 07 1996 RPX CLEARINGHOUSE LLC Call-forwarding system using adaptive model of user behavior
5917891, Oct 07 1996 RPX CLEARINGHOUSE LLC Voice-dialing system using adaptive model of calling behavior
5995945, Aug 25 1997 JDA SOFTWARE GROUP, INC System and process for inter-domain planning analysis and optimization using model agents as partial replicas of remote domains
5997167, May 01 1997 Control Technology Corporation Programmable controller including diagnostic and simulation facilities
6043867, May 05 1997 Rafael Armament Development Authority Ltd Tracking system that includes means for early target detection
6064971, Oct 30 1992 Adaptive knowledge base
6064972, Sep 17 1997 AT&T Corp Risk management technique for network access
6065003, Aug 19 1997 Microsoft Technology Licensing, LLC System and method for finding the closest match of a data entry
6073115, Sep 30 1992 MARSHALL, CHARLES C, MR ; MAXUS STRATEGIC SYSTEMS INC Virtual reality generator for displaying abstract information
6078901, Apr 08 1996 Quantitative supply and demand model based on infinite spreadsheet
6092056, Apr 06 1994 MORGAN STANLEY SERVICES GROUP INC Data processing system and method for financial debt instruments
6112188, Oct 30 1992 Privatization marketplace
6125355, Dec 02 1997 FINANCIAL ENGINES, INC Pricing module for financial advisory system
6134536, May 29 1992 Alice Corporation Pty Ltd Methods and apparatus relating to the formulation and trading of risk management contracts
6148293, Jan 18 1995 Method and apparatus of creating a financial instrument and administering an adjustable rate loan system
6167117, Oct 07 1996 RPX CLEARINGHOUSE LLC Voice-dialing system using model of calling behavior
6173276, Aug 21 1997 SCICOMP INC , A TX CORP System and method for financial instrument modeling and valuation
6189011, Mar 19 1996 Siebel Systems, Inc. Method of maintaining a network of partially replicated database system
6209124, Aug 30 1999 TouchNet Information Systems, Inc. Method of markup language accessing of host systems and data using a constructed intermediary
6230486, Dec 17 1998 Honda Giken Kogyo Kabushiki Kaisha Plant control system
6249784, May 19 1999 Nanogen, Inc.; NANOGEN, INC System and method for searching and processing databases comprising named annotated text strings
6263314, Dec 06 1993 EASTERN IX GROUP LLC Method of performing intellectual property (IP) audit optionally over network architecture
6266605, Dec 17 1998 Honda Giken Kogyo Kabushiki Plant control system
6272449, Jun 22 1998 International Business Machines Corporation Computer system and process for explaining behavior of a model that maps input data to output data
6278981, May 29 1997 International Business Machines Corporation Computer-implemented method and apparatus for portfolio compression
6282531, Jun 12 1998 COGNIMED INC System for managing applied knowledge and workflow in multiple dimensions and contexts
6301584, Aug 21 1997 RELATIVITY DISPLAY LLC System and method for retrieving entities and integrating data
6317787, Aug 11 1998 WEBTRENDS, INC System and method for analyzing web-server log files
6324533, May 29 1998 International Business Machines Corporation Integrated database and data-mining system
6327590, May 05 1999 GOOGLE LLC System and method for collaborative ranking of search results employing user and group profiles derived from document collection content analysis
6330564, Feb 10 1999 International Business Machines Corporation System and method for automated problem isolation in systems with measurements structured as a multidimensional database
6332130, Aug 25 1997 JDA SOFTWARE GROUP, INC System and process for inter-domain planning analysis and optimization using model agents as partial replicas of remote domains
6332163, Sep 01 1999 Accenture Global Services Limited Method for providing communication services over a computer network system
6337552, Jan 20 1999 Sony Corporation Robot apparatus
6347306, Jul 21 1998 CYBERSHIFT HOLDINGS, INC Method and system for direct payroll processing
6362589, Jan 20 1919 Sony Corporation Robot apparatus
6366934, Oct 08 1998 International Business Machines Corporation Method and apparatus for querying structured documents using a database extender
6377263, Jul 07 1997 Aesthetic Solutions Intelligent software components for virtual worlds
6418448, Dec 06 1999 METHOD AND APPARATUS FOR PROCESSING MARKUP LANGUAGE SPECIFICATIONS FOR DATA AND METADATA USED INSIDE MULTIPLE RELATED INTERNET DOCUMENTS TO NAVIGATE, QUERY AND MANIPULATE INFORMATION FROM A PLURALITY OF OBJECT RELATIONAL DATABASES OVER THE WEB
6490560, Mar 01 2000 Nuance Communications, Inc Method and system for non-intrusive speaker verification using behavior models
6490579, Jul 16 1998 NTT DATA SERVICES CORPORATION Search engine system and method utilizing context of heterogeneous information resources
6507353, Dec 10 1999 VIRTUAL SOLUTIONS LLC Influencing virtual actors in an interactive environment
6520861, Mar 21 2000 SONY NETWORK ENTERTAINMENT PLATFORM INC ; Sony Computer Entertainment Inc Entertainment apparatus, storage medium, and method of displaying an object
6564213, Apr 18 2000 A9 COM, INC Search query autocompletion
6584507, Mar 02 1999 Cisco Technology, Inc Linking external applications to a network management system
6633863, Mar 16 1998 ROWANALYTICS LIMITED Database useful for configuring and/or optimizing a system and a method for generating the database
6639591, Mar 21 2000 DROPBOX INC Entertainment apparatus, storage medium, and method of deciding weather
6654389, Nov 23 1999 GOOGLE LLC System and method for searching patterns in real-time over a shared media
6654730, Dec 28 1999 Fuji Xerox Co., Ltd. Neural network arithmetic apparatus and neutral network operation method
6667593, Jan 20 1999 Sony Corporation Robot apparatus
6671673, Mar 24 2000 International Business Machines Corporation Method for integrated supply chain and financial management
6684204, Jun 19 2000 GOOGLE LLC Method for conducting a search on a network which includes documents having a plurality of tags
6704032, Oct 27 2000 Microsoft Technology Licensing, LLC Methods and arrangements for interacting with controllable objects within a graphical user interface environment using various input mechanisms
6732095, Apr 13 2001 Oracle America, Inc Method and apparatus for mapping between XML and relational representations
6738753, Aug 21 2000 Modular, hierarchically organized artificial intelligence entity
6741973, Apr 04 1997 CITIBANK, N A Consumer model
6785651, Sep 14 2000 Microsoft Technology Licensing, LLC Method and apparatus for performing plan-based dialog
6795811, Apr 26 2000 Method for investing working capital
6816753, Oct 11 2000 Sony Corporation Robot control system and robot control method
6836719, Oct 15 2001 FORD MOTOR COMPANY, A DELAWARE CORPORATION Method and system for controlling a vehicle
6836773, Sep 28 2000 Oracle International Corporation Enterprise web mining system and method
6876992, Nov 28 2000 Willis North America Inc. Method and system for risk control optimization
6909708, Nov 18 1996 Verizon Patent and Licensing Inc System, method and article of manufacture for a communication system architecture including video conferencing
6910135, Jul 07 1999 Raytheon BBN Technologies Corp Method and apparatus for an intruder detection reporting and response system
6941499, Jun 18 2001 Taiwan Semiconductor Manufacturing Company Method to verify the performance of BIST circuitry for testing embedded memory
6947870, Aug 18 2003 Baker Hughes Incorporated Neural network model for electric submersible pump system
6947988, Aug 11 2000 Wilmington Trust, National Association, as Administrative Agent Method and apparatus for allocating resources of a contact center
6961731, Nov 15 2000 CALLAHAN CELLULAR L L C Apparatus and method for organizing and/or presenting data
7006992, Apr 06 2000 PACKWOOD, THOMAS R Risk assessment and management system
7024589, Jun 14 2002 International Business Machines Corporation Reducing the complexity of finite state machine test generation using combinatorial designs
7047227, Dec 22 2000 VOXTIME, LTD Interface between vendors and customers that uses intelligent agents
7069204, Sep 28 2000 Cadence Design Systems, INC Method and system for performance level modeling and simulation of electronic systems having both hardware and software elements
7076713, Oct 31 2000 WSOU Investments, LLC Test generator for converting a model of computer component object behavior and stimulus values to test script
7085683, Apr 30 2001 COMMONWEALTH OF AUSTRALIA, THE Data processing and observation system
7089237, Jan 26 2001 GOOGLE LLC Interface and system for providing persistent contextual relevance for commerce activities in a networked environment
7089518, May 08 2004 International Business Machines Corporation Method and program product for modelling behavior of asynchronous clocks in a system having multiple clocks
7096299, Nov 14 2002 HEWLETT-PACKARD DEVELOPMENT COMPANY, L P Method and apparatus for transferring system context information between mobile computer and base station
7162379, Oct 29 2004 Korea Electric Power Corporation Electronic power-measurement device with intelligent agent
7170510, Nov 14 2003 Oracle America, Inc Method and apparatus for indicating a usage context of a computational resource through visual effects
7181438, May 30 2000 RELATIVITY DISPLAY LLC Database access system
7194070, Apr 30 2004 Microsoft Technology Licensing, LLC Integrated telephone call and context notification mechanism
7216121, Dec 31 2002 International Business Machines Corporation Search engine facility with automated knowledge retrieval, generation and maintenance
7219073, Aug 03 1999 GOOGLE LLC Method for extracting information utilizing a user-context-based search engine
7219105, Sep 17 2003 GOOGLE LLC Method, system and computer program product for profiling entities
7246080, Jun 08 2001 International Business Machines Corporation Apparatus, system and method for measuring and monitoring supply chain risk
7249342, Jul 12 2002 Cadence Design Systems, INC Method and system for context-specific mask writing
7250944, Apr 30 2001 COMMONWEALTH OF AUSTRALIA, THE Geographic view of a modelling system
7260498, Jun 17 2005 Siemens Healthcare Diagnostics Inc Context-specific electronic performance support
20010034268,
20010034686,
20010041995,
20010041996,
20020002520,
20020016758,
20020023034,
20020046143,
20020052820,
20020087532,
20020087535,
20020147880,
20020152222,
20020169759,
20030018961,
20030037043,
20030083973,
20030217097,
20040083101,
20040088239,
20040100494,
20040107181,
20040139106,
20040172319,
20040193503,
20040193894,
20040194099,
20040199445,
20040215495,
20040215522,
20040225629,
20040236621,
20040236673,
20040254932,
20040260695,
20050027507,
20050060311,
20050071266,
20050071328,
20050119900,
20050119919,
20050119922,
20050119959,
20050149496,
20050154711,
20050165777,
20050187920,
20050237939,
20050251468,
20060143115,
20060184449,
20070101566,
EP587290,
GB2253081,
/////
Executed onAssignorAssigneeConveyanceFrameReelDoc
Nov 19 2003Asset Trust, Inc.(assignment on the face of the patent)
Jul 08 2005EDER, JEFF S ASSET TRUST, INC ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0162390297 pdf
Jun 22 2012EDER, JEFFREY SCOTTASSET RELIANCE, INC DBA ASSET TRUST, INC NUNC PRO TUNC ASSIGNMENT SEE DOCUMENT FOR DETAILS 0285260437 pdf
Jun 25 2012ASSET RELIANCE, INC DBA ASSET TRUST, INC Square Halt Solutions, Limited Liability CompanyASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0285110054 pdf
Aug 26 2015Square Halt Solutions, Limited Liability CompanyXenogenic Development Limited Liability CompanyMERGER SEE DOCUMENT FOR DETAILS 0374220944 pdf
Date Maintenance Fee Events
Dec 12 2011M2551: Payment of Maintenance Fee, 4th Yr, Small Entity.
Dec 29 2015M1552: Payment of Maintenance Fee, 8th Year, Large Entity.
Jan 06 2016R2552: Refund - Payment of Maintenance Fee, 8th Yr, Small Entity.
Jan 06 2016STOL: Pat Hldr no Longer Claims Small Ent Stat
Dec 18 2019M1553: Payment of Maintenance Fee, 12th Year, Large Entity.


Date Maintenance Schedule
Jul 15 20114 years fee payment window open
Jan 15 20126 months grace period start (w surcharge)
Jul 15 2012patent expiry (for year 4)
Jul 15 20142 years to revive unintentionally abandoned end. (for year 4)
Jul 15 20158 years fee payment window open
Jan 15 20166 months grace period start (w surcharge)
Jul 15 2016patent expiry (for year 8)
Jul 15 20182 years to revive unintentionally abandoned end. (for year 8)
Jul 15 201912 years fee payment window open
Jan 15 20206 months grace period start (w surcharge)
Jul 15 2020patent expiry (for year 12)
Jul 15 20222 years to revive unintentionally abandoned end. (for year 12)